The UK banking sector appears pretty confident in its assertions that ‘contactless’ technology is 100% secure from unauthorised access, and similar claims are also made in respect of Britain’s e-passport. The argument goes something like this; without an ability to cross-reference information that has been ‘skimmed’ from a contactless device with a user profile that is held within a central database – then the data obtained by the ‘skimmer’ is meaningless. It’s a reasonable argument, one that makes sense and ought to offer us a very real measure of confidence in ‘contactless’ banking. However, with the announcement that Sony’s PlayStation has fallen victim to a serious hacking incident, leaving users vulnerable to ID theft, some may wonder just how many customer databases elsewhere have been compromised in recent years?
The results of a very ‘quick and dirty’ trawl through certain internet news portals, looking for examples of database hacking, makes for unsettling reading.
But do keep in mind there’s no need to worry unduly about contactless crime; as a number of products are already available that will allow any concerned carrier of RFID-enabled cards or passports to shield their data. For instance RFID Protect in the UK, offers a wide range of ‘anti-skim’ shielding products.
So here’s a snapshot of some newsworthy hacks – or data losses – over the past decade.
28 February 2014: Suffolk hacker charged with accessing U.S. Federal Reserve servers
Four months following his arrest in Suffolk, England by UK law enforcement agencies, Lauri Love has been charged with gaining unlawful access to U.S. Federal Reserve and military computer servers. He is further accused of widely disclosing sensitive information about individuals who use these systems; such as access names, email addresses and telephone details.
Although the extent of the data breach is not yet clear, the hacker appears to have deployed a “sequel injection” hacking technique and his transgression is considered serious enough to warrant a potential 10 year prison sentence.
Evidence has emerged that the hacker may have worked alongside three co-conspirators to infiltrate other systems; such as the U.S. Missile Defence Agency, NASA and the U.S. Environmental Protection Agency.
13 February 2014: Hackers gain access to over 2,000 Tesco.com customer accounts
UK supermarket giant Tesco.com is “urgently investigating” a significant data breach, which has seen over 2,000 customer accounts hacked by a third party. BBC sources suggest that users’ passwords and email addresses were compromised; the details of which have been posted online in an attempt to acquire store vouchers unlawfully.
Tesco has issued a public statement of reassurance and claims it has contacted all customers who may have been affected by this security breach.
Cross-referencing customer information from other successful (and unrelated) hacking incidents elsewhere appears to have been central to the Tesco.com breach.
12 January 2014: Hackers steal the personal information of at least 70 million customers from high-street retailers over the festive season
American luxury specialty department store, Neiman Marcus, has admitted that it has also fallen prey to a massive cyber attack – which began with Target’s December 19 disclosure that some 40 million payment card numbers had been stolen.
On Friday January 11 2014, a spokesperson for The Target Corporation issued a statement to the effect that, “…this data breach was worse than initially thought.”
A subsequent investigation has established that hackers successfully stole the personal information of at least 70 million customers; including names, mailing addresses, telephone numbers and email addresses.
70 million customers – in a word, staggering!
23 April 2013: UK Police Forces apologise after staff data sent to a private security firm
Cambridgeshire, Bedfordshire and Hertfordshire police forces issued formal apologies to over 1,000 staff after mistakenly releasing their personal details to G4S (a private security contractor). A spokesperson for the three police forces explained that the breach occurred during negotiations with G4S, concerning the potential to outsource certain office functions.
G4S confirmed that any files containing sensitive date had now been deleted, and the police authorities issued apologies to those staff affected.
David Craig from the union Unison said: “Many of the members of staff affected are understandably angry and will be reviewing their individual position following any determination by the ICO at the appropriate time.”
The Information Commissioner’s Office (ICO) has made a firm commitment to investigate this matter.
29 August 2012: Cambridge University hacked
The University of Cambridge has announced it will investigate serious hacking claims linked to certain software systems on campus. Media sources have revealed that several university departments and ‘secure’ databases were unlawfully accessed by hacking outfit ‘NullCrew’. There is a growing suspicion that NullCrew has ties with hacking network ‘Anonymous’ and its action at Cambridge University has in some way been an attempt to support the WikiLeaks founder Julian Assange.
16 November 2011: Virginia Commonwealth University (VCU) hacked
Virginia Commonwealth University (VCU) released a statement regarding an incident of unauthorized access to a campus computing server. The VCU server housed files with the personal information on more than 175,000 current and former faculty, staff, students and affiliates. Servers supporting a VCU system uncovered suspicious files on one of its servers. During forensic investigation, subsequent analysis then showed the intruders had compromised a second server – thru the first server attack – which contained data on 176,567 individuals.
Data items included either a name or eID, Social Security Number and, in some cases, date of birth, contact information, and various programmatic or departmental information.
1 November 2011: UK local councils – a history of misplacing our private data
A new report makes the disturbing claim that some 132 authorities are implicated in over 1,034 individual instances of private data loss since 2008. The report has revealed that, “…at least 244 laptops and portable computers, 98 memory sticks and 93 mobile devices went missing between 2008 and 2011.”
In light of this development, The Information Commissioner (ICO) reminded the 132 councils involved of their obligations under the Data Protection Act (2003), i.e. to keep private data secure.
Only 55 incidents were reported to the Information Commissioner’s Office (ICO) and just 9 people were ousted as a consequence, according to those councils which responded.
15 June 2011: Citibank & International Monetary Fund (IMF) hacked
Last week’s data breach at Citibank, which is said to have compromised the personal details of up to 200,000 consumers, was followed on Monday by a reported hack at the International Monetary Fund (IMF). Serious incidents at two of the world’s most high-profile financial institutions within a matter of days of one another has once again highlighted the need for new legislation to govern online financial services and ensure authentication is in place.
14 June 2011: National Health Service (NHS) UK database hacked
Computer hackers have penetrated NHS systems, triggering fears that the security of highly sensitive patient records is at risk. The hackers are part of the same online gang that recently hacked into electronics giant Sony, accessing the images of a million users. The self-styled ‘pirate ninjas’, known as Lulz Security, sent a warning to the NHS that its computer networks were vulnerable to cyber attack. In an email to health staff, hackers gave evidence of some of the passwords, saying: ‘While you aren’t considered an enemy – your work is of course brilliant – we did stumble upon several of your admin passwords.’
The hackers added: ‘We mean you no harm and only want to help you fix your tech issues.’
21 May 2011: Lockheed Martin Corporation in near-miss hacking episode
Lockheed Martin Corp., the U.S. government’s top information technology provider, released a statement to the effect that it detected and thwarted, “a significant and tenacious attack” on its information systems network in May 2011. The statement continued stating that Lockheed’s information security personnel, “…are working around the clock to restore employee access to the “information systems network” targeted in the May 21 attack.” Bethesda, Maryland-based Lockheed, the Pentagon’s No. 1 supplier by sales and the world’s largest aerospace company, has kept the “appropriate U.S. government agencies” informed of its actions, it added.
27 April 2011: Sony’s PlayStation hacked
We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network. Although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state/province, zip or postal code), country, email address, birthdate, PlayStation Network/Qriocity passwords and login and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained. If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained. While there is no evidence that credit card data was taken at this time, we cannot rule out the possibility. If you have provided your credit card data through PlayStation Network or Qriocity, to be on the safe side we are advising that your credit card number (excluding security code) and expiration date may also have been obtained.
20 April 2011: Children’s Place says customer database hacked
(Reuters) – Children’s Place Retail Stores Inc said its customer database has been hacked, and clients were sent an unauthorized email directing them to a website where they were asked to enter their credit card numbers for a software upgrade. The company notified customers about the hacking on Tuesday evening through an email. “Our third party email service provider has informed us that only email addresses were accessed and no other personal information was obtained,” the company said in the email. “The Children’s Place would not ask you, in an email, to update any software or for other highly sensitive personal information,” the email said. The Secaucus, New Jersey-based company has been leaning heavily on e-commerce sales to boost business.
18 April 2011: European Space Agency hacked
A hacker has claimed to have breached the European Space Agency, gaining access to and publishing online what appears to be 200 usernames, passwords and email addresses related to the organisation, along with details on root servers and databases.
14 April 2011: WordPress hacked
Open source blogging website WordPress.com suffered a hack attack on its servers, prompting the company behind the popular content management system to issue a warning about passwords. In a brief note from Automattic, it said that an intruder broke into WordPress.com and gained access to multiple servers and the source code that powers blogs for its VIP customers, including CNN, CBS, Flickr and TED. This attack follows a distributed-denial-of-service attack that knocked WP offline last month.
13 April 2011: Barracuda Networks Embarrassed By Database Hack
Hacked security company Barracuda lost email addresses of employees, channel partners and sales leads. Security software producer Barracuda Networks was hit by a SQL injection attack launched on April 9 while the company’s own Barracuda Web Application Firewall was offline for scheduled maintenance, Michael Perone, Barracuda Network executive vice president, wrote on the corporate blog. The attacker uncovered email addresses of select Barracuda employees with their passwords as well as name, email address, company affiliations and phone numbers of sales leads generated by the company’s channel partners. Barracuda does not store any financial information in that database. “The bad news is that we made a mistake,” Perone said.
4 April 2011: JPMorgan, Kroger Database Hacked
Personal information about some JPMorgan Chase & Co and Kroger Co customers was exposed as part of a data breach at a large online marketing vendor. The data breach included some email addresses of JPMorgan Chase customers and names and email addresses of Kroger customers, the companies said in separate statements on Friday. Epsilon, a unit of Alliance Data Systems Corp, said on Friday that a person outside the company hacked into some of its clients’ customer files. Some of Epsilon’s other clients include Verizon, Blackstone Group LP’s Hilton Hotels, Kraft, and AstraZeneca.
31 March 2011: IEEE member database hacked
Over 800 members’ credit card details exposed. A hacker stole the credit card details of over 800 members of the IEEE (Institute of Electrical and Electronics Engineers) last December, according to its law firm. A team of IEEE-appointed forensic investigators “concluded that a file containing customer credit card information had been deleted on or about November 17, 2010”, the institute’s law firm told the Attorney General of New Hampshire in February. The forensic team believed that 828 members’ credit card numbers, associated names, expiration dates and security numbers may have been accessed.
29 March 2011: Australia PM Julia Gillard’s computer ‘hacked'(original article Written by BBC News)
The government was alerted to the security breach by a US intelligence tip-off, Sydney’s Daily Telegraph said. It is reported that several thousand emails may have been accessed from the computers of at least 10 ministers. The Australian authorities have refused to confirm or deny on the reports. The cyber attacks are believed to have targeted the Australian Parliament House email network, the less secure of two networks used by MPs. Among the computers allegedly breached were those belonging to Foreign Minister Kevin Rudd and Defence Minister Stephen Smith.
24 March 2011: TripAdvisor database hacked – email addresses compromised
If you have ever rated something on TripAdvisor, you may be in for a nasty surprise in your inbox in the coming weeks. Last weekend, hackers penetrated the TripAdvisor member database and stole up to 20 million records. In a statement issued by TripAdvisor on their site, the only information they say was impacted involved email address. TripAdvisor does not store credit card information or other financial data and passwords are said to be secure. As a precaution, it may still be safe to change your TripAdvisor password and anywhere else you used that same password.
24 March 2011: Have cybercriminals hacked Visa/Mastercard 3-D Secure?
You’re probably familiar with the 3-D Secure system of card security for online transactions – aka Verified by Visa (for Visa) and SecureCode (for MasterCard) – but now a security researcher is reporting that cybercriminals may have found a way around the online transaction security. According to former Washington Post security researcher Brian Krebs, a dashboard panel in a cracking utility he accessed online has a tab labelled `Arcot.’ “Arcot Systems is the company whose software powers the authentication system used by MasterCard’s SecureCode and Visa’s Verified by Visa programs”, he says in his latest security blog. “What’s interesting is that the thieves could defeat these security systems by gathering personal data on victim card holders, which they appear to have done here”, he adds. Krebs goes on to note that the panel, like others used in tandem with Zeus – for example, Jabberzeus – is also is set up to alert the botmaster via Jabber instant message when a new set of credentials is stolen. Infosecurity notes that this is a potentially serious development, as the 3-D Secure passphrase system was developed to authenticate online users’ payment card transactions. If the technology has been subverted by hackers in an automated package/service in this way, there could be serious consequences for online card security.
21 March 2011: Hacked security firm leaves Aussies vulnerable
Hundreds of thousands of cryptographic tokens used by Australians who bank online, governments, airline staff and other large companies vulnerable to a potential hack attack.
21 February 2011: Hackers Penetrate Nasdaq Computers
Hackers have repeatedly penetrated the computer network of the company that runs the Nasdaq Stock Market during the past year, and federal investigators are trying to identify the perpetrators and their purpose, according to people familiar with the matter. The exchange’s trading platform—the part of the system that executes trades—wasn’t compromised, these people said. However, it couldn’t be determined which other parts of Nasdaq’s computer network were accessed. Investigators are considering a range of possible motives, including unlawful financial gain, theft of trade secrets and a national-security threat designed to damage the exchange.
“So far, [the perpetrators] appear to have just been looking around,” said one person involved in the Nasdaq matter. Another person familiar with the case said the incidents were, for a computer network, the equivalent of someone sneaking into a house and walking around but—apparently, so far—not taking or tampering with anything.
A spokesman for Nasdaq declined to comment.
11 January 2011: UConn Customer Database Hacked
UConn is warning thousands of customers who bought items on it’s HuskyDirect.com website that their personal information may have been exposed in a data security breach. A hacker obtained access to the HuskyDirect.com database containing billing information for 18,000 customers. The website is used by people to buy sports gear from the UConn Co-op. The information at risk includes customers’ names, addresses, email, telephone number, credit card number, expiration date and security code, according to the university. The database is run by an outside vendor, which contacted the Co-op about the security breach. It is still unclear how many accounts were actually accessed, UConn said in a release. The Co-op instructed the vendor to take down the database, and has notified authorities, the release stated. Customers who purchased items in the Co-op with a credit card, or students to bought text books or made purchases in the store are not at risk. Those affected were notified by the Co-op, and a process has begun to arrange for credit protection for those customers, the university said.
20 December 2010: English Defence League donor details ‘stolen’ after database hacked
Police are believed to be investigating the security breach, which also included the far-Right groups’s payment system being illegally accessed, The Daily Telegraph can disclose. Amid fears of violence toward members, the EDL said it will support vulnerable people. They also urged members to change their online shopping details after concerns were raised that they would be published on the internet. Officials were forced to email supporters after the incident, which is understood to have occurred in recent days, apologising for the “attack”.
13 December 2010: McDonald’s: Customer Database Hacked
McDonald’s Corp. says some of its customers’ private information was exposed during a data breach. The company said Monday that a third-party was able to get past security measures and see into a database of its customer information that included e-mail, phone numbers, addresses, birth dates and other specifics that they provided when signing up for online promotions or other subscriptions to its websites.
12 December 2010: Gawker Commenter Database Hacked
If you’ve ever commented on one of the Gawker Media sites, you might want to change your password. According to Mediaite, Gawker’s commenter database has been hacked. The database is home to about 1.5 million usernames, emails, and passwords. Gawker originally denied that there had been a breach. “No evidence to suggest any Gawker Media’s user accounts were compromised, and passwords encrypted anyway,” tweeted Gawker editorial directer Scott Kidder. However, Kidder eventually confirmed the hack.”Our user databases do indeed appear to have been compromised,” he said in a note on the site. “The passwords were encrypted. But simple ones may be vulnerable to a brute-force attack You should change the password on Gawker (GED/commenting system) and on any other sites on which you’ve used the same passwords. Out of an abundance of caution, you should also change your company email password and any passwords that might have appeared in your email messages.”
9 December 2010: Cyberattacks against MasterCard, Visa, PayPal
Hackers launched cyberattacks yesterday against MasterCard, Visa, PayPal, a Swiss bank, Swedish prosecutors, Sarah Palin and others deemed an enemy of WikiLeaks and its jailed founder, Julian Assange. Calling themselves “Anonymous,” the hackers, who previously waged war against the Church of Scientology, overloaded the target Web sites with “denial of service” attacks. “If we let WikiLeaks fall without a fight, then governments will think they can just take down any sites they wish,” one hacker told The Guardian newspaper of Britain.
31 August 2009: UK Parliament Website Hacked
A hacker broke into the database of the UK Parliament website by exploiting an SQL injection vulnerability. The incident reveals very poor and questionable password security practices on behalf of the website administration. The security hole on parliament.uk was discovered by a Romanian greyhat hacker going by the online handle of “Unu,” who has made a habit of testing high profile websites for similar bugs. The website’s database is called parliament_live; fortunately, it cannot be accessed directly from a remote host. What is more disconcerting though is what a peak into the database table housing the website’s administrative accounts revealed. First of all, the passwords are stored in plain text, which is a major security oversight. Secondly, the passwords are very weak from a security perspective, many being identical to the username they are associated with and almost all of them being common words. One of the accounts called “fullera” is likely to belong to Alex Fuller, who, according to his LinkedIn profile page, is currently employed as a senior web producer for the UK Parliament. Two other accounts that have captured our attention are called “reida” and “moss,” but we are unable to confirm if these belong to Mr. Alan Reid, Liberal Democrat MP, and Mr. Malcolm Moss, Conservative MP.
11 September 2009: RBS WorldPay downplays database hack reports
RBS WorldPay and a hacker are at loggerheads over the seriousness of a supposed breach on websites run by the payment processing firm. Security shortcomings – since blocked – on RBS WorldPay website exposed confidential information, including admin passwords and the contact details of partners, according to blog posts by Romanian hacker Unu. The grey-hat hacker previously exposed similar problems on the websites of the UK parliament and HSBC France, among many others. As before he published screenshots to back up his latest claims. RBS WorldPay initially responded to our inquiries by saying that the reported SQL injection attacks mounted by Unu were thrown against test websites. All the dummy data involved was fictitious and in no way confidential, so there was no breach.
16 July 2009: Five NHS Trusts slammed by ICO for breaching Data Protection Act
The Information Commissioner’s Office (ICO) has issued more warnings to NHS bodies after five Trusts have been found to breach the Data Protection Act, with one trust leaving patient notes on a bus. The latest warnings join a long list of data protection warnings by the NHS, as the ICO once again warned hospital trusts about the importance of data security. In February, three trusts were hit with enforcement action within two weeks. Five trusts – Royal Free Hampstead, Chelsea and Westminster, Hampshire Partnership, Surrey and Sussex, and Epsom and St Helier — have signed formal undertakings to process personal data legally in future, the ICO said on Tuesday. NHS knuckle-rapped for lax data protection
10 June 2009: T-Mobile confirms customer records taken
T-Mobile has now confirmed that a hacker, known as “Pwnmobile,” gained unauthorized access to its records and that the stolen data Pwnmobile posted online is authentic. A spokesman for the wireless giant said, “…regarding the recent claim, we’ve identified the document from which information was copied, and believe possession of this alone is not enough to cause harm to our customers.”
11 May 2009: UC Berkeley Database Hacked, 160,000 Records Compromised
The FBI is investigating a data breach that occurred when hackers infiltrated a medical database shared by the University of California, Berkeley, and Mills College that contained health-care information and Social Security numbers for more than 160,000 students, alumni and their families. Security experts say the hack could have been prevented by protecting the sensitive medical information stored on easily accessible spreadsheets. News of the data breach came to light Friday after it was discovered that hackers had broken into a medical database UC Berkeley shared with Mills College that contained health-related information for students, alumni and their families.The stolen data included more than 97,000 Social Security numbers, as well as health insurance information and nontreatment medical information, such as immunization records and the names of some of the physicians the victims have seen for diagnoses or treatment. UC Berkeley officials said, however, that personal records, such as patients’ treatments and therapies, were stored on a separate system not affected by the data breach.
30 April 2009: UK hospital loses the medical treatment details of 741 patients
Addenbrooke’s Hospital, in Cambridgeshire was instructed by the Information Commissioners Office (ICO) to overhaul its security in the wake of a massive data loss in 2008. It transpires that a USB memory stick – (or ‘flash drive’) – containing the unencrypted medical treatment details of 741 patients went missing after, “…a member of staff left it in an unattended vehicle”. Although the device was subsequently returned to Addenbrooke’s Hospital, its governing body Cambridge University Hospital NHS Foundation Trust was found to be in breach of The Data Protection Act (2003).
The Hospital has made a firm commitment to review its security measures and will seek to protect personal information more effectively in the future.
3 March 2009: Prime Minister’s health records breached in NHS database attack
Personal medical records belonging to Scotland’s rich and powerful – including Prime Minister Gordon Brown and Holyrood’s First Minister Alex Salmond – have been illegally accessed in a breach of a national database that holds details of 2.5 million people. The files contained names, ages, addresses, and occupations of the patients, in addition to medical information such as a list of any current medications and allergies to medicines, according to The Sunday Mail. The records of BBC newswoman Jackie Bird (an earlier version of this story mistakenly referred to her as “newsman”) and former Labour leader Jack McConnell and his culture chief wife Bridget were also accessed.
1 January 2009: Monster’s databases hacked – Data fraud hits job seekers
Monster Worldwide Inc., the popular global website for job hunters, said Tuesday that hackers have broken into its databases and stolen personal data. Monster spokeswoman Nikki Richardson confirmed that sites around the world had been targeted, but said some regions, notably Asia Pacific and eastern Europe, were spared. She said Monster was working with the “appropriate law enforcement agencies” but declined to say in which countries. In the United States, where the company is based, “an investigation is in progress.” Monster operates in 36 countries with millions of users, including 4.5 million in Britain. A statement on http://www.monster.com said: “We recently learned our database was illegally accessed and certain contact and account data were taken, including Monster user IDs and passwords, email addresses, names, phone numbers, and some basic demographic data.” The breach did not access resumes, social security numbers or financial data, Monster said. The company advised clients to change their password and said it had taken its own “corrective steps.” The company processes 100 million payment card transactions every month for 175,000 businesses, USA Today daily reported.
23 August 2005: U.S. Military Database Hacked – Air Force Personnel Files For 33,000 Officers And Others At Risk
A suspected hacker has tapped into a U.S. military database containing Social Security numbers and other personal information for 33,000 Air Force officers and some enlisted personnel, an Air Force spokesman said Tuesday. That figure represents about half of the officers in the Air Force, but no identity theft had been reported as of early Tuesday, said Tech. Sgt. James Brabenec, a spokesman at Randolph Air Force Base. The case was under investigation. “We are doing everything we can to catch and prosecute those responsible,” Maj. Gen. Tony Przybyslawski said in a statement. Social Security numbers, birth dates and other information was accessed sometime in May or June, apparently by someone with the password to the Air Force computer system, Brabenec said. On Friday, the people affected were notified of steps they can take to protect their identity, he said.
18 June 2005: 40 Million Credit Card Numbers Hacked – Data Breached at Processing Center (Washington Post Staff Writers)
More than 40 million credit card numbers belonging to U.S. consumers were accessed by a computer hacker and are at risk of being used for fraud, MasterCard International Inc. said yesterday. In the largest security breach of its kind, MasterCard officials said all credit card brands were affected, including 13.9 million cards bearing the MasterCard label. A spokeswoman for Visa USA Inc. confirmed that 22 million of its card numbers may have been breached, while Discover Financial Services Inc. said it did not yet know if its cards were affected. MasterCard officials said consumers are not held responsible for unauthorized charges on their cards, and that other sensitive personal data, such as Social Security numbers and birth dates, were not stored in the hacked system. So far, no evidence of fraudulent charges has emerged, they said. The breach occurred late last year at a processing center in Tucson operated by CardSystems Solutions Inc., one of several companies that handle transfers of payment between the bank of a credit card-using consumer and the bank of the merchant where a purchase was made. CardSystems’ computers were breached by malicious code that allowed access to customer data, said Josh Peirez, a MasterCard senior vice president. Peirez said MasterCard is certain only that 68,000 of its numbers were taken by the hacker over an unknown amount of time before the breach was discovered. But because the hacker had access to the full database, it is difficult to say how many more numbers may have been taken, he said. He said the breach was not confirmed until about two weeks ago. MasterCard said it has begun notifying banks that issue its cards, which in turn are responsible for notifying cardholders.
26 February 2005: Bank of America loses a million customer records
A “small” number of backup tapes with records detailing the financial information of government employees were lost in shipment to a backup center, Bank of America said on Friday. The tapes contained information on the customers and accounts of the U.S. government’s SmartPay charge card program, which has more than 2.1 million members and annual transactions totaling more than $21 billion, according to the General Services Administration. Reports have pegged the number of cards affected at 1.2 million. The acknowledgment comes as several other cases of businesses losing consumer information have come to light. Last week, data collection company ChoicePoint announced that it had given information on approximately 150,000 subscribers to about 50 fake business fronts created by fraudsters.
18 February 2003: Credit card database hacked
A computer hacker has gained access to more than 5 million Visa and Mastercard credit card accounts in the US. The two companies said on Tuesday that none of the information obtained, which would include credit card numbers, was used in a fraudulent way.But a UK-based business crime expert warned account holders could still be at risk if their cards were not reissued. Visa and Mastercard said the hacker breached the security system of a company that processes credit card transactions on behalf of merchants.The only way to eradicate the risks would be to reissue all 5 million… cards.
And so it goes on and on…
Find out even more information about what ‘black hat’ hackers may be plotting for the months to come at: http://linux-news.oribium.net/tag/security