Point-of-sale transactions could pose more of a risk for data theft than online transactions, according to a Gartner analyst. Using a credit card at a gas station could pose more of a risk for data theft than shopping online, as point-of-sale terminals have emerged as a weak link in the security chain, according to a Gartner analyst.When a card is swiped, point-of-sale (POS) terminals often collect and store the data held in the magnetic stripe on the back of a credit card, said Avivah Litan, a Gartner vice president and distinguished analyst. Retailers are often unaware that their POS applications collect so much information.In the hands of sophisticated hackers and counterfeiters, the data collected from the magnetic stripe is enough to create a replica card. “It’s almost more dangerous to go to the gas station than it is online,” Litan said at Gartner’s Identity and Access Management Summit in London on Monday. “The data is just sitting there. No one even thought about what data is on a POS controller.”Retailers’ network configurations are partly to blame. Many are using the Internet to transmit data in place of dial-up networks, and many have incorporated wireless access points into their networks using wired equivalent privacy, Litan said, which is not considered a strong form of encryption. Hackers lurk in parking lots looking for weak networks to penetrate. Since the POS terminals are linked via IP, once a hacker has accessed a network he can try out neighboring IP addresses until they locate a store of data, Litan said.Data breaches that occur offline are common. Of 160 breaches investigated for one major credit card brand, 128 took place in the brick-and-mortar world where the card was physically present for the transaction, rather than being used online or over the telephone, according to Gartner. To strengthen security, card brands such as Visa and MasterCard are pressuring retailers to comply with the Payment Card Industry (PCI) Data Security Standard, a code of best practices created by the card industry. The standard forbids the storing of magnetic stripe data on POS terminals, and Visa plans to start fining retailers in the coming months if they don’t comply, according to Gartner.Implementing security is cheaper in the long run than having a data breach, which can be expensive and hurt a company’s reputation. Gartner calculates that a data breach costs companies about US$300 per exposed account because of investigations, fines and lawsuits. On the other hand, beefing up security costs around $16 per account for the first year, and that cost falls over time, according to Litan.The short-term forecast for POS security doesn’t look great, however. Gartner predicts that by next year, most attacks against retailers will be directed at their POS terminals, and only 30 percent of POS software will be compliant with the prevailing security standards by 2009.“The thieves always find the path of least resistance,” Litan said. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe