Home Business IT Security A target for hackers

Global retail store giant Target USA’s point of sale system was hacked in December – more than 40 million US customers card and other details have been breached, apparently by a Ukrainian crime syndicate.

A note to Australian readers – Target Australia is owned by Wesfarmers (Coles, Kmart, OfficeWorks and Bunnings) and uses a different web site and technology – this article is about the vulnerability of online sites and point of sale sytems and shows even a reputable company such as Target USA can struggle to in its duty of care to shoppers.

As is custom in the US a growing list of class actions – 40 at last count - seeks to punish the company for failing to protect shopper’s data.

Target has not revealed the full extent of the data stolen. Other reports state that customer names, credit or debit card numbers, expiration dates and CVVs were involved in the information theft – all used for false credit card transactions. Target says that this was encrypted and is safe.

An FTC (Federal Trade Commission) report uses the words “What the hackers obtained is as good as gold.” The lawsuits - all positively phrased to accentuate the potential for loss of course - suggest that the affected customers will have to worry about data security for years.

It is not clear how the hack occurred but it has been suggested that malware was responsible. Malware can be manually loaded by someone with access to the corporate network, or more worryingly, from an internet connected device somewhere on Target’s network. If it is the latter, it could set back the cause of Bring Your Own Device considerably.

Target has engaged a third party to track down the cause – but it should release its findings quickly - customers deserve to know what happened and how future attacks will be prevented.

Target is also establishing a credit card monitoring program but details are not available yet.

Apparently, master phishers have been quick to spam Target customers purporting to be from Target asking for social security number, credit card number, and/or other personal information.

Opinion

The internet is a dangerous place – I am sure Target USA did everything it could to secure its systems.

Add that to recent hacks at Snapchat, Skype, Twitter, Facebook and the paranoia gauge goes off the chart.

The kicker is that if such a big fish can be hacked then what about the minnows that we use every day for on-line shopping.

Online security will be a hot topic in 2014.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Connect