lsanderson: (Default)
lsanderson ([personal profile] lsanderson) wrote2014-01-18 04:41 am

Targhetto?

A Sneaky Path Into Target Customers’ Wallets
By ELIZABETH A. HARRIS, NICOLE PERLROTH, NATHANIEL POPPER and HILARY STOUTJAN. 17, 2014
It was, in essence, a cybercriminal’s dream.

For months, an amorphous group of Eastern European hackers had been poking around the networks of major American retailers, searching for loose portals that would take them deep into corporate systems.

In early November, before the holiday shopping season began, the hackers found what they had been looking for — a wide path into Target and beyond.

Entering through a digital gateway, the criminals discovered that Target’s systems were astonishingly open — lacking the virtual walls and motion detectors found in secure networks like many banks’. Without those safeguards, the thieves moved swiftly into the company’s computer servers containing Target’s customer data and to the crown jewel: the in-store systems where consumers swipe their credit and debit cards and enter their PINs.

Post a comment in response:

(will be screened)
(will be screened if not on Access List)
(will be screened if not on Access List)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting