Update: 'Hacker safe' Web site gets hit by hacker
Geeks.com warns customers of possible data compromise despite security certification
Computerworld - Just because a Web site has a certification claiming that it is virtually hackproof, that doesn't necessarily mean it's immune to all intrusions.
A case in point is Geeks.com, which on Friday began notifying an unspecified number of customers that their personal and financial data may have been compromised by an intrusion into the systems that run the online technology retailer's Web site. Geeks.com, whose formal business name is Genica Corp., said in a letter to customers that it discovered the security breach on Dec. 5.
The compromised information included the names, telephone numbers and street and e-mail addresses as well as the Visa credit card numbers, card expiration dates and three-digit card verification numbers of the notified customers, according to a copy of the letter that was posted on The Consumerist blog.
Geeks.com is a $150 million company specializing in the sale of computer-related excess inventory and manufacturers' closeouts. Its Web site prominently proclaims that it is tested on a daily basis by ScanAlert Inc., a vendor in Santa Clara, Calif., that agreed in October to be acquired by McAfee Inc. (download PDF).
ScanAlert says its vulnerability scanning service is designed to constantly monitor Web sites for vulnerabilities that could compromise customer data. The service is used by more than 250,000 Web sites, of which about 80,000 -- including Geeks.com -- display ScanAlert's "Hacker Safe" seal. ScanAlert describes the seal as a "trustmark" that is designed to help reassure consumers about a site's security precautions.
However, Nigel Ravenhill, a ScanAlert spokesman, said today via e-mail that the vendor had withdrawn the Hacker Safe certification from Geeks.com "several times" last year due to the existence of vulnerabilities in the retailer's systems. Geeks.com fell out of compliance with ScanAlert's security requirements last June and then again in December, according to Ravenhill.
"During these periods, the Hacker Safe seal was not allowed to appear on their Web site," Ravenhill wrote in the e-mail. "Preliminary evidence uncovered while investigating this matter suggests that the breach most likely occurred during one of these periods."
He added that each time ScanAlert withdrew its certification, "Geeks.com's IT staff worked diligently to fix the problem. As of today, Geeks.com is meeting the Hacker Safe security standard."
ScanAlert conducts daily security audits to certify that its clients comply with the requirements of the Hacker Safe seal, Ravenhill noted. "As long as the standard is met on a daily basis, ScanAlert will continue to allow a date-stamped image to appear on the client's Web site," he wrote.
A telephone operator at Geeks.com's headquarters in Oceanside, Calif., said that she was unable to find anyone at the retailer who could comment about the incident. She instead provided a toll-free telephone number -- (888) 529-6261 -- that Geeks.com has set up to assist customers with questions and concerns related to the incident.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts