40 Million Credit Card Accounts Breached at Target

40 Million Credit Card Accounts Breached at Target

40 Million Credit Card Accounts Breached at TargetWell, it looks like holiday shoppers patronizing Target may have gotten scrooged by some sophisticated hackers! As many as 40 million shoppers who purchased items from Target’s brick-and-mortar stores with their credit cards from November 27 to December 15, 2013 may have been impacted.

The Secret Service has the responsibility to safeguard the U.S.’ financial infrastructure and payment systems, so they are currently investigating the breach that was initially discovered last month around the time of Black Friday via a report from Brian Krebs, a security researcher.

As soon as Target executives were alerted to the breach, they immediately notified authorities and financial institutions, and even hired a forensics team to thoroughly investigate how the unauthorized access occurred.

“Target’s first priority is preserving the trust of our guests, and we have moved swiftly to address this issue so guest can shop with confidence,” assured Gregg Steinhafel, CEO of Target Corp.

Shoppers, it’s important to realize that hackers could possibly withdraw cash from your account using counterfeit debit cards at ATMs, if they were able to intercept your PIN number. And, it has been confirmed that stolen data includes customer names, credit/debit card numbers, expiration dates and security codes found on the back of cards.

“A concern is that the thieves could attempt to make counterfeit cards, because the stolen data came from the accounts of customers who made purchases by swiping their cards at terminals,” said White & Case Partner Daren Orzechowski, who focuses on information technology legal matters, including privacy. “Target or the credit card company may have to offer these customers something, such as credit monitoring, to protect them from suffering any monetary losses and to preserve goodwill.

"Any time an organization finds itself a victim of a data breach, it puts its brand and reputation at risk because it can significantly damage consumer trust. For retailers, something like this is terrible, but they can better navigate the situation if they have a plan and protocol in place to address a breach, if and when it happens. The last thing a business wants to do is to scramble to come up with a remedy after a breach has occurred.”

Target regrets any inconvenience this has caused as they continue to invest in their security practices to protect shoppers’ data.

Things to Do If You Believe Your Financial Data Has Been Stolen

  • If you discover suspicious activity or suspect fraud, notify your financial institution immediately.
  • Request your credit report from Equifax, Experian and TransUnion to make sure no fraudulent transactions have been made on your accounts.
  • Ask credit agencies about fraud alerts, and consider security freezes on your accounts.
  • Bonus Tip: Monitor your financial data frequently. (I monitor mine on a daily basis.)

(Photo courtesy of Lynn Watson/Shutterstock.com)

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3