Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Target Confirms Hackers Stole 40 Million Credit Cards
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
kwieting
100%
0%
kwieting,
User Rank: Apprentice
12/19/2013 | 12:16:21 PM
Re: Yikes.
ACM, Question:  How could a merchant possibly be compliant to any standard if they are breached?  It's ridiculous to think a merchant is compliant after the fact either.
Drew Conry-Murray
67%
33%
Drew Conry-Murray,
User Rank: Ninja
12/19/2013 | 11:49:16 AM
Re: Nice Holiday Present
Thanks for link from Avivah. She calls out something that has always frustrated me about PCI: that a certified compliant company can be retroactively found non-compliant if there's a breach. The card brands seem to want to promote the ridiculous fantasy that PCI is a perfect system, and if a compliant company gets breached, then it must have been because weren't really compliant. It's bizarre logic.

 
anon4768076153
50%
50%
anon4768076153,
User Rank: Apprentice
12/19/2013 | 11:48:23 AM
Re: Nice Holiday Present
After hearing the news about Target hackings,  I checked my statement and lo and behold,  (I just shopped the Target store in Kearny Mesa San Diego (Othello) and my $81.00 bill turned into $101.00, I think the store manager might want to check one of their employees ... at around 2:45pm 12/19/13 description of cashier: heavy set Black (sorry not a racist ! just a description)  Unfortunately I threw out my receipt after unloading the items.  Managers only have to remember one of their other employee, named Teresa who did the same thing !
MarciaNWC
100%
0%
MarciaNWC,
User Rank: Apprentice
12/19/2013 | 11:29:13 AM
Re: Nice Holiday Present
I also shopped at Target during the affected period, and am really frustrated. This breach underscores the broken nature of the payment card system. Gartner's Avivah Litan wrote a good analysis: http://blogs.gartner.com/avivah-litan/2013/12/19/what-can-we-learn-from-the-target-breach/.

 
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
12/19/2013 | 11:05:01 AM
Re: Nice Holiday Present
We've used the Target store credit card (Red Card) for our recent purchases there. Wondering if Target is better able to protect customers in that instance. If the crooks have that card #, at least they couldn't use it anywhere other than Target.
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
12/19/2013 | 11:00:27 AM
Nice Holiday Present
As someone who shopped at Target during the breach period, I'll be spending the holidays taking a closer look at my card statements.
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
12/19/2013 | 10:56:47 AM
Yikes.
What a nightmare. While Target should be commended for coming clean so quickly, it's unsettling that this type of ordeal could happen to such a large corporation and affect such a large number of people.
<<   <   Page 3 / 3


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-21690
PUBLISHED: 2022-01-18
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components ...
CVE-2022-21692
PUBLISHED: 2022-01-18
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.
CVE-2022-21694
PUBLISHED: 2022-01-18
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this...
CVE-2022-21700
PUBLISHED: 2022-01-18
Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConversionContext as this type is erroneously used ...
CVE-2022-21691
PUBLISHED: 2022-01-18
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.