Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Target Confirms Hackers Stole 40 Million Credit Cards
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
kwieting
100%
0%
kwieting,
User Rank: Apprentice
12/19/2013 | 12:16:21 PM
Re: Yikes.
ACM, Question:  How could a merchant possibly be compliant to any standard if they are breached?  It's ridiculous to think a merchant is compliant after the fact either.
Drew Conry-Murray
67%
33%
Drew Conry-Murray,
User Rank: Ninja
12/19/2013 | 11:49:16 AM
Re: Nice Holiday Present
Thanks for link from Avivah. She calls out something that has always frustrated me about PCI: that a certified compliant company can be retroactively found non-compliant if there's a breach. The card brands seem to want to promote the ridiculous fantasy that PCI is a perfect system, and if a compliant company gets breached, then it must have been because weren't really compliant. It's bizarre logic.

 
anon4768076153
50%
50%
anon4768076153,
User Rank: Apprentice
12/19/2013 | 11:48:23 AM
Re: Nice Holiday Present
After hearing the news about Target hackings,  I checked my statement and lo and behold,  (I just shopped the Target store in Kearny Mesa San Diego (Othello) and my $81.00 bill turned into $101.00, I think the store manager might want to check one of their employees ... at around 2:45pm 12/19/13 description of cashier: heavy set Black (sorry not a racist ! just a description)  Unfortunately I threw out my receipt after unloading the items.  Managers only have to remember one of their other employee, named Teresa who did the same thing !
MarciaNWC
100%
0%
MarciaNWC,
User Rank: Apprentice
12/19/2013 | 11:29:13 AM
Re: Nice Holiday Present
I also shopped at Target during the affected period, and am really frustrated. This breach underscores the broken nature of the payment card system. Gartner's Avivah Litan wrote a good analysis: http://blogs.gartner.com/avivah-litan/2013/12/19/what-can-we-learn-from-the-target-breach/.

 
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
12/19/2013 | 11:05:01 AM
Re: Nice Holiday Present
We've used the Target store credit card (Red Card) for our recent purchases there. Wondering if Target is better able to protect customers in that instance. If the crooks have that card #, at least they couldn't use it anywhere other than Target.
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
12/19/2013 | 11:00:27 AM
Nice Holiday Present
As someone who shopped at Target during the breach period, I'll be spending the holidays taking a closer look at my card statements.
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
12/19/2013 | 10:56:47 AM
Yikes.
What a nightmare. While Target should be commended for coming clean so quickly, it's unsettling that this type of ordeal could happen to such a large corporation and affect such a large number of people.
<<   <   Page 3 / 3


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5669
PUBLISHED: 2021-10-26
Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
CVE-2021-40343
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. Insecure file permissions on the nagios_unbundler.py file allow the nagios user to elevate their privileges to the root user.
CVE-2021-40344
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution.
CVE-2021-40345
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
CVE-2021-42343
PUBLISHED: 2021-10-26
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (ty...