December 19, 2013 |
Concerned Target Corp. customers took to Twitter on Thursday to express concern and frustration about the disclosure that hackers stole credit card and debit card information from some 40 million of the retailers' customers. Several wondered what they should do to protect themselves. Some said they were immediately canceling all of their credit cards to avoid the potential for fraud. Others said they planned to stop shopping at Target. If the concern on Twitter was any indication, Target has quite a public relations fiasco on its hands.
December 19, 2013 |
As millions of bargain-crazed customers swarmed through Target stores on Black Friday, one of the most audacious heists in retail history was quietly underway. A band of cyberthieves pilfered credit and debit card information from the giant retailer's customers with pinpoint efficiency as shoppers bought discounted sweaters and electronic gear on the unofficial launch of the holiday shopping season. By the time the scheme was discovered, the unidentified hackers had made off with financial data of 40 million Target customers over a 21/2-week period.
February 22, 2013 |
The Federal Trade Commission opened a potentially significant new front Friday in its efforts to protect consumers against data theft. The commission announced a settlement with mobile device manufacturer HTC America that requires the company to plug security holes in millions of smartphones and tablet computers, develop a comprehensive approach to data protection and undergo independent security assessments every other year. Federal law gives the commission the authority to go after "unfair" business practices that harm consumers, and it's used that authority increasingly in recent years to crack down on companies that don't safeguard the sensitive data they collect from customers.
February 21, 2013
In what has become a depressingly familiar ritual, computer security experts revealed this week that hackers with apparent ties to a foreign government - in this case, the Chinese military - had "systematically stolen hundreds of terabytes of data from at least 141 organizations" since 2006. But while such high-level international cyber intruders grab headlines, most successful online attacks are not all that sophisticated. Despite their Hollywood-enhanced image as inventive uber-geeks, most hackers don't actually have to work very hard to steal data or disrupt websites.
October 24, 2012 |
Barnes & Noble, the country's largest bookseller, said data thieves hacked into payment devices at 63 of its stores nationwide and may have stolen credit and debit card information from customers. The chain said it discovered that in each of the stores, hackers had planted bugs in one card reader. Customers swipe their payment cards through the readers and, if debit card users, enter their personal identification number, or PIN. Machines were tampered with in Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania and Rhode Island.
February 15, 2012 |
Is your address book community property? Some app makers seem to think so. The buzz in the tech world is that a number of high-profile apps, including Facebook and Twitter, routinely access and rip off smartphone users' contacts. The apps in question run on Apple's iOS andGoogle's Android operating systems. The practice hit the spotlight after a techie noticed that Path, a social network, was uploading entire address books without users' permission. The company has since said it will stop the practice and get rid of all the purloined data.