Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Than 50% Of Biggest Holiday Retailers May Not Be PCI-Compliant
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
12/26/2016 | 8:24:36 PM
Re: TJX -- have we not learned?
"Who do we hold accountable"

This is a good question. Unless we put bad guys under enough pressure this will most likely never end.
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
12/26/2016 | 8:22:20 PM
D?
 

I really wonder what D stands for in this case, is it like no firewall in the perimeter?
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
12/26/2016 | 8:21:54 PM
Re: TJX -- have we not learned?
"I tend to pay with cash almost always."

This is a good idea. What I hate is the changes I get back, becomes harder to deal with after a while.
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
12/26/2016 | 8:20:27 PM
Re: TJX -- have we not learned?
"The wise man learns from the others' mistakes."
Agree. Wiser man put his learning into action.

 
Dr.T
0%
100%
Dr.T,
User Rank: Ninja
12/26/2016 | 8:19:02 PM
No security breach yet?
I would wait for a few years to see if there was any security breach during this holiday season, it seem that is how it works these days.
ClarenceR927
100%
0%
ClarenceR927,
User Rank: Strategist
12/23/2016 | 10:49:13 AM
compliance != secure
Having consulted at 4 very large and well known retailers (and countless smaller ones) I can assure you that compliance does not equal secure. Management has always been very concerned about PCI compliance but not really willing to do what is necessary to be secure.  Good enough to pass the audit is good enough. I made things as much better as management was willing to go but none of them is really as secure as we should expect and PCI is mostly window dressing.

When you use your credit card you are simply a wildebeest on the plains. If the lion chooses you, you are as good as eaten.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
12/23/2016 | 2:51:32 AM
Re: TJX -- have we not learned?
Not paying with Bitcoin, Joe? :-)

It's tough knowing what we know and then going out and having to decide how we pay for things.  Personally, while I do try to use caution, I also case the hardware and make eye contact with my clerks when paying with credit.

The question I always ask here is "Who do we hold accountable?"  The vendors for not better promoting secure practices with their hardware?  The companies for not hiring good InfoSec?  Or InfoSec for not getting the message out there better?

Sometimes it feels like we have to have more than regulatory and legal shackles to force security to happen.  Perhaps a cease-and-desist order to close a business that doesn't pass should be implemented.  How many of those will be issued before everyone starts passing their compliance audits.

That this happens again and again is almost rediculous.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/22/2016 | 6:55:40 PM
TJX -- have we not learned?
There's an old adage:

The fool never learns.

The smart man learns from his own mistakes.

The wise man learns from the others' mistakes.

Its applicability here: After the TJX breach years ago, which happened because of the failure to be compliant with the spirit of PCI-DSS and best practices related thereto, this is inexcusable.

For these reasons, I tend to pay with cash almost always.  (And ESPECIALLY this time of year!)

<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-44093
PUBLISHED: 2021-11-28
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
CVE-2021-44094
PUBLISHED: 2021-11-28
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
CVE-2021-4020
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-23654
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
CVE-2021-43785
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...