Target customers' card data at risk after store thefts
The information may have been stolen through card devices at Target stores, according to reports
IDG News Service - Credit and debit card information of many Target customers may have been stolen during the Black Friday weekend, according to reports.
The thieves got access to data stored on the magnetic stripe on the back of the credit and debit cards through card swiping devices that could have been tampered with at the retailer's stores, reported the Wall Street Journal on Wednesday, citing people familiar with the matter.
The data on the stripe could be used to make counterfeit cards. If the thieves also intercepted PIN (personal identification number) data for debit transactions, they "would theoretically be able to reproduce stolen debit cards and use them to withdraw cash from ATMs," wrote security news writer Brian Krebs.
Target did not immediately respond to a request for comment.
Millions of cardholders could be vulnerable as a result of the breach that is believed to have affected about 40,000 card devices at store registers, the Journal said, citing people familiar with the incident. The breach extends to nearly all Target locations in the U.S., said Krebs, who quoted unnamed sources at two of the top 10 credit card issuers.
Krebs reported that it was initially thought that the breach extended from just after Thanksgiving 2013 to Dec. 6. But investigators found evidence that the breach lasted longer, possibly as far as Dec. 15, he reported, citing two unnamed sources.
The Secret Service is investigating the breach but would not discuss details of an ongoing investigation , a spokesman told the Wall Street Journal.
A breach of credit card information was reported last year by Global Payments. The payments processing services company said information on up to 1.5 million card numbers may have been "exported" as a result of an unauthorized access into its processing system.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts