![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Sears Holdings just announced it, no indication as to how many cards or a date range but they are saying that no cards are yet being used fraudulently. We'll see how long that holds true. They're also saying only Track 2 data was compromised, so no personal identity info stolen that could promote ID theft, just simple credit theft. It was a point of sale hack, so either the same group that did Target/Michaels/Home Depot/etc or someone using the same malware package.
The Dairy Queen breach was suspected in August but only now confirmed, no indications how long or how many cards were compromised. This one was a cash register compromise, so probably a different batch of crooks.
I just had my card replaced because of the Home Depot hack, we use Kmart as my wife's pharmacy and both of us have used our cards there. So if our cards ever stop working, now we know why, and at least it's a good thing that our bank is actually being preemptive.
http://krebsonsecurity.com/2014/10/malware-based-credit-card-breach-at-kmart/
The Dairy Queen breach was suspected in August but only now confirmed, no indications how long or how many cards were compromised. This one was a cash register compromise, so probably a different batch of crooks.
I just had my card replaced because of the Home Depot hack, we use Kmart as my wife's pharmacy and both of us have used our cards there. So if our cards ever stop working, now we know why, and at least it's a good thing that our bank is actually being preemptive.
http://krebsonsecurity.com/2014/10/malware-based-credit-card-breach-at-kmart/
no subject
Date: 2014-10-11 03:45 pm (UTC)Still, maybe that's how things will indeed evolve - Apple Pay, f'rex, is based on tokens, so the information transferred at the time of transaction doesn't include the card number. With NFC finally being effectively mandated in the US shortly, perhaps the state of card processing will be dragged forward from this mire of "16 digits" "oh, plus these 3" "ah, no, you'll need a password too, and be able to give us three characters from it".
no subject
Date: 2014-10-12 04:24 pm (UTC)I once heard of an interesting methodology that superficially seems good to me. All electronic, all with high crypto. I'm making a purchase at a merchant, the merchant sends me a packet identifying the transaction number and price, I transmit a packet that encapsulates that and authorizes it, it goes to my bank to authorize payment, which sends it to the merchant's bank and transfers the payment electrons. The merchant doesn't hold my payment account info, nor does the merchant's bank. Confirmation of payment flows back down the chain, and everything is solid, signed, crypto.
The problem is updating infrastructure, no one wants to pay the money, so they add layer upon layer of creaking and teetering old code. Look at how long IPv6 is taking for universal adoption, and how many security vulnerabilities are still being found in v4.
no subject
Date: 2014-10-11 10:05 pm (UTC)no subject
Date: 2014-10-12 04:15 pm (UTC)no subject
Date: 2014-10-12 05:14 pm (UTC)