Target says hackers likely accessed 40 million cards
Thieves pilfer data stored on magnetic stripes of credit and debit cards used by holiday shoppers, Target confirms
IDG News Service - Target has confirmed that data from about 40 million credit and debit cards was stolen at its stores between Nov. 27 and Dec. 15.
The statement from the retailer Thursday follows reports that thieves had accessed data stored on the magnetic stripe on the back of credit and debit cards during the Black Friday weekend through card swiping machines that could have been tampered with at the retailer's stores, a practice known as card skimming.
The data could have been used to create counterfeit cards that could even be used to withdraw money at an ATM, according to the reports.
The card information that may have been compromised includes the name of the customer, credit or debit card number, the cards expiration date and the three-digit CVV security code, Target said in a note to customers. Shoppers at its online store Target.com or at physical stores outside the U.S were not affected, it added.
Target said it "is working closely with law enforcement and financial institutions, and has identified and resolved the issue." It also said it was working with an outside forensics firm.
Customers who suspect unauthorized activity should contact the company, Target said.
Security news writer Brian Krebs reported Wednesday that it was first thought that the breach extended from just after Thanksgiving 2013 to Dec. 6. But investigators found evidence that the breach may have lasted up to Dec. 15, which has now been confirmed by Target.
Millions of cardholder accounts may have been vulnerable after the breach that is believed to have affected about 40,000 card machines at store registers, The Wall Street Journal said, quoting people familiar with the situation. Sources at two of the top 10 card issuers told Krebs that the breach had affected nearly all Target locations in the U.S.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts