Forgot your password?
typodupeerror
Security

TJX Is Biggest Data Breach Ever 104

Posted by kdawson
from the millions-and-milliions dept.
jcatcw writes "Jaikumar Vijayan reports for Computerworld that TJX is finally offering more details about the extent of the compromise which, at 45.6M cards, is the biggest ever. He has been following the story since it started. The systems that were broken into processed payment card, checks, and returns for customers of T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright stores in the U.S. and Puerto Rico, and customers of Winners and HomeSense stores in Canada and T.K. Maxx in the U.K. Customer names and addresses were not included in the stolen data. So far the company has spent about $5 million in connection with the breach. Several lawsuits that have been filed against the company, including a suit by the Arkansas Carpenters Pension Fund, one of its shareholders, for failure to divulge more details about the breach."
This discussion has been archived. No new comments can be posted.

TJX Is Biggest Data Breach Ever

Comments Filter:
  • Suggested (Score:5, Interesting)

    by Stanistani (808333) on Thursday March 29, 2007 @01:04PM (#18530239) Homepage Journal
    Suggested new tag for stories like this - pwnshop
    • Re: (Score:1, Informative)

      by Anonymous Coward
      All I can say is that I worked there after the breach, and omg was it a joke.

      Not to mention there was only 1 guy that was running the portion that led to the infiltration ! That is plain and simple nuts ! What a shame though they are a really nice group of folks around that shop and this breach was not just them.

      Also I wonder exactly how many folks were affected and they didn't know until they got a new bank card or credit card.

      Also this is an example of retail , where making money is #1 and all else is #2.
    • Re: (Score:3, Funny)

      TJ Maxx - Where tchotchkes go to die.....
  • first we heard of this was our bank re-issuing visa cards for anyone who had shopped there in the past.
    -nB
    • You're lucky. I heard of it after I discovered $16,000 worth of fraudulent AirFrance tickets charged to my credit card. Thankfully, the credit card co removed the charges. My other bankcards were also swapped out by my bank on their own.

      Does this mean that the ass-hats that did this are in France? Can we blame France?
    • by PIPBoy3000 (619296) on Thursday March 29, 2007 @01:13PM (#18530379)
      The worst part was getting a new PIN that didn't have the easy-to-remember "69" in the digits. Now I'm stuck with one that has no sexual connotations at all. Sniff.
      • Re: (Score:1, Funny)

        by Anonymous Coward
        What's your new pin, I'll come up with something for you!
      • by pcardno (450934)
        There's always 8008.... Nice memories of upside down calculators..
      • Tip: walk to any ATM and change it.
        • by ncc74656 (45571) *

          Tip: walk to any ATM and change it.

          What ATM lets you change the PIN on your ATM card? That sounds like it'd be a security hole bigger than Mr. Goatse.cx's backside.

    • by Jester998 (156179)
      I heard about the TJX breach a long time ago, but didn't know who it affected until my bank sent me a new VISA card too. :p
  • Legal ramifications (Score:3, Interesting)

    by Mister Whirly (964219) on Thursday March 29, 2007 @01:04PM (#18530249) Homepage
    When a breach like this happens, is the company legally obligated to inform those who may have had their information compromised?? If so, how the hell do you do that with 45 million people?
    • by GWLlosa (800011)
      You can't notify the people involved. Read the article. They don't even know for sure which data was stolen.
      • I did read the article, and that is why I am wondering - how do you go about informing people when you are not sure who or the extent of the data affected? Do they have to inform you of a "maybe" incident if they even suspect something?
      • by Andrewkov (140579)
        I need to be notified of the breach, and I need to be notified *before* it happens.
    • When a breach like this happens, is the company legally obligated to inform those who may have had their information compromised?? If so, how the hell do you do that with 45 million people?
      Well, you can be damn sure they'd find a way if 45 million people owed them money.
    • Re: (Score:3, Informative)

      by mrhandstand (233183)
      I'm a QDSP (VISA PCI certified assessor - been through VISA requirements training). Yes, you have to notify those who have been effected - as for how - snail mail. After all, they HAVE your info...
    • by echo_kmem (982727)
      The Responsibility of Identifying those 'Cards' affected is with the Financial Institutions. Most have the ability to attempt to scan through their Customers transactions and possibly determine who was affected by this even in the slightest, and issue a new card to their Customer/Client/Member, Etc.

      And just to add, TJX/TJ Max/Etc, is just the latest in a long history of comprimises occurring. In Example, about a year or so ago, Mastercard just had trouble with one of it's Vendors not meeting minimum require
    • by Hulleye (126367)
      Easy. log on to irc, buy back the data you lost and send out legalese spam to 45 million people.
  • All encompassing (Score:4, Interesting)

    by HomelessInLaJolla (1026842) * <lajollahomeless@hotmail.com> on Thursday March 29, 2007 @01:07PM (#18530273) Homepage Journal

    The breach is sure to lend urgency to efforts by the major credit card companies to get retailers to implement PCI requirements...So far about 50% of Tier 1 merchants...are fully compliant

    TJX is a Tier 1 merchant and may even qualify to be a processor
    PCI requirements, even for Tier 1 merchants, don't seem to have much credibility when a rogue gang of six people [computerworld.com] can infiltrate TJX and Wal-Mart.

    Losses experienced by Wal-Mart and the banks issuing the credit cards total more than $8 million and are still being calculated
    I'd like more technical details. Are there any theories about how the attackers breached the system? Who wrote the front line software which they breached? Who wrote the operating system it runs on? Who wrote the database system which was being used? Who was in charge of network monitoring and security at the time? What tools were they misusing (obviously) that they weren't able to catch this ahead of time?

    The six named people must have had some deep insight to the code on which these systems were running. Maybe they had inside help. If I really wanted to be paranoid I'd suggest that the six named people were caught port-scanning the servers and they're being used as the fall guys so that the real criminals, probably insiders, can slip out the back door.

    Patriot illegal HP domestic wiretap Enron insider FBI trading Martha 9/11 Stewart Congressional inquiry comes to mind.
    • by larkost (79011)
      Those six people were caught using the credit card information, that is not to say that they were the ones who obtained it in the first place. They probably purchased the sub-set of the information that they were using from someone else (who might still be a step or two removed from the initial cracker). There seems to be a whole ecosystem of people trafficking in data like this, with the initial providers only working through multiple layers of intermediaries.
      • There seems to be a whole ecosystem of people trafficking in data like this, with the initial providers only working through multiple layers of intermediaries
        Sort of like the Federal Government politicians separating themselves from Wall Street bankers by multiple layers of contractors, subcontractors, nonprofits, and private companies.

        The ecosystem, in this example, is trafficking in taxpayer money and insider trading information.
    • by eimsand (903055)
      According to the rumor mill that I plug into, Wal-Mart was not actually compromised. Instead, as I heard it, the thieves purchased Wal-Mart gift cards with the stolen cards. The rumor I heard was that the cards were purchased with enough frequency and for large enough dollar amounts so that Wal-Mart's internal fraud alerts were set off.
    • by rs232 (849320) on Thursday March 29, 2007 @02:29PM (#18531707)
      'The six named people must have had some deep insight to the code on which these systems were running. Maybe they had inside help. If I really wanted to be paranoid I'd suggest that the six named people were caught port-scanning the servers and they're being used as the fall guys so that the real criminals, probably insiders, can slip out the back door'

      An interesting exercise in fallacious reductio ad absurdum. Just because they passed the cards don't mean they wrote the code and the Florida police caught them port-scaning the server and only arrested them to give the real criminals time slip out the back door.

      Do you seriously think the hackers would drive about Florida trying to pass the stolen cards, especially months after it went public. The six are more likely to be down stream crooks that purchased the stolen card details not realising where they came from.

      Re:All encompassing (Score: 5, Interesting :)
    • by Gary W. Longsine (124661) on Thursday March 29, 2007 @03:40PM (#18533123) Homepage Journal
      Of course, the attacker might have a team of experts, moles planted in the corporation, and their own Tom Cruise who slapped magnetic signs on a white van, posed as a janitor, rappelled into the hermetically sealed server room, looked under keyboards for the post-it with the root password, modified the corporation's custom software on the fly and installed the resulting trojaned version (all without touching the floor) and then cleaned the urinals on his way out so that nobody would suspect a thing for years in a mission-impossible-style coordinated assault requiring deep insight to the code, but given that most such incidents of data theft are quite a bit less sophisticated, I doubt deep insight was required.

      Deep insight is mainly useful to attackers who seek a very specific set of data from a particular target. People after credit card data typically just cast a wide net and exploit the low hanging fruit. Let a worm loose, it gets in somewhere. See what it finds. Exploit it. Much, much simpler. Of course since we lack the technical details you mentioned (and others) we have no idea what really happened, and the technical details would probably be interesting. I suspect that the weeks long delay in releasing the information that came out today was due to the fact that the investigators suspected, or merely feared, an inside job.

      This is a common and largely emotional response to an attack like this. "Somebody broke into our highly secure system and stole 45 million customer records complete with credit card numbers? Inconceivable!" ("You keep using that word. I do not think it means what you think it means.")

      It's certainly *not* a requirement to have "deep insight" into the code or even the specific computing infrastructure of the typical corporation in order to steal data. In fact, ordinary insight is sufficient once you have access, given the attacker has basic technical skills. Rather than deep insight, what is usually seen is a plodding industrial spam-like approach.
      • bots are built and released to the wild internet (network worms, email worms, web trojans, etc.)
      • a single system behind a company firewall is infected with the bot (e.g. through a web browser, or a laptop hit by a worm at a coffee shop)
      • the bot spreads behind the company firewall, infecting many machines, attracting much attention
      • company managers crack the whip over IT to clean up the mess without re-installing the infected systems, often against the advice of people who understand the problem who say things like, "we have no way to know what damage has been done, the only secure fix is to re-image the infected systems," which sounds are like one hand clapping to managers who have been told to contain IT costs
      • some of the infected systems are "noisy", probing around the network trying to spread itself
      • some of the infected systems are "stealthy", the bot does not attempt to spread further from them, it seeks data on the local system including what processes are running on the system
      • some of the infected systems appear to have data of interest to the attacker
      • the bot is instructed to install a root kit and possibly remove itself from the system
      • the attacker explores the systems of interest, looking for files, looking at database contents, stealing what they want, etc.

      From the article:
      "In addition, the technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006," the company said. It did not elaborate on the technology it was referring to.

      This sounds like a smokescreen. The "technology" might be quite simple and common. Any of these could apply, for example:

      • the intruders used scp to upload files to a remote host so our IDS logged the connection, but we can't tell what was in the files
      • the intruders used ftp, but our IDS system was configured to log only meta-data
    • by PPH (736903)

      I'd like more technical details. Are there any theories about how the attackers breached the system?

      NPR had a bit on this on the news at noon. Apparently, some 'software' was discovered on several computers in one of their corporate offices back in December. At that time, they turned the case over to law enforcement. The magnitude of the breach has only recently become evident, requiring TJX to notify the SEC about events that may have a material effect on their financial status. IBM has been working on the

      • I've seen the same. At Battelle, in Aberdeen, MD, more than one system had popups which arrived on the desktop when no browser was running. When I worked on the Aberdeen Proving Grounds military base, as a contractor for Battelle, the public use computers were absolutely riddled with quirks (eg. sound drivers failing, mouse clicks lost, shared drives disappearing and reappearing) which weren't consistent with usual WinNT problems, weren't part of announced outages, and didn't correspond with scheduled sys
  • by Critical Facilities (850111) on Thursday March 29, 2007 @01:07PM (#18530283) Homepage
    From TFA:
    Customer names and addresses were not included with any of the payment card data believed stolen from the Framingham systems, TJX said. Also, the company "generally" did not store Track 2 data from the magnetic stripe on the back of payment cards for transactions

    Also from TFA:
    It is hard to know exactly what kind of data was stolen because a lot of the information accessed by intruders was deleted by the company in the normal course of business. "In addition, the technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006," the company said.

    Sounds like they're just desparately trying to control the obviously egregious oversights that happened here. It also sounds like they're still trying to figure out what has happened. To say that heads are rolling is probably the biggest understatement ever.
  • The Answer is... (Score:5, Insightful)

    by WED Fan (911325) <akahige@@@trashmail...net> on Thursday March 29, 2007 @01:09PM (#18530307) Homepage Journal

    The simple answer for users, and it exists now: Revokeable Credit Cards.

    The long term is separation of credit and banking from the Social Security system.

    • by afidel (530433)
      The answer is smart cards. I had a credit card with a smartchip in it from 2000-2005 and the chip was used exactly three times, twice at burger kings and once at a haircut place. None of the major retailers had the readers (or the readers didn't enforce smartcard use for cards with the flag). The only other use was for extra security in online banking, which is already probably the most secure part of the CC system due to SSL. If CC companies and merchants were serious about security smartcards with picture
      • by hacker (14635)

        The answer is smart cards. I had a credit card with a smartchip in it from 2000-2005 and the chip was used exactly three times, twice at burger kings and once at a haircut place.

        How is THAT the answer, when only 3 places in the 5 years you've used the card, support reading the chip on it? Doesn't sound very pervasive to me.

        • by afidel (530433)
          It's the answer to the need for security, but unfortunately the people who need to implement the security don't seem to really care about it. It apparently costs them less to do nothing and pay out for breaches than it would to implement real security. Unfortunately it costs the powerless consumers orders of magnitude more in time, frustration, and real costs to fix the problem but that isn't the concern of the companies because it doesn't show up on the balance sheet and there is no real alternative.
      • by Beardo the Bearded (321478) on Thursday March 29, 2007 @02:33PM (#18531819)
        The answer isn't expensive smart cards with new infrastructure. As you've stated, the smart card chips aren't used in the majority of places.

        Fortunately, we don't have to so that. It's way simpler.

        1. Require all credit cards to add a photograph to the back as well as a signature panel. Overlay parts of the photo with holograms to make sure it's tough to copy. (It's not like the "lost card" field does fuck all when you've lost the card.)

        2. Put identity photographs in everyone's credit history. If you're getting a mortgage or credit card or something else where you have to go in person, then it's pretty obvious if you're faking it.

        3. Have the credit agency computers call a number listed in the credit history every time the history is accessed. ("This is Equifax. Beardo has applied for a $500k mortgage. If you are not aware of this transaction, call 1-800-HEY-WAIT.")

        That's it.

        The reason we won't see this - ever - is because it will cost the banks money to implement. When they can instead blame the victims for their DARING to have their stuff stolen, why bother to invest in making a secure environment? After all, it's perfectly secure from the bank's point of view.
        • by WGFELyL5 (989566)

          3. Have the credit agency computers call a number listed in the credit history every time the history is accessed. ("This is Equifax. Beardo has applied for a $500k mortgage. If you are not aware of this transaction, call 1-800-HEY-WAIT.")

          You can do something like this now by filing a "fraud alert [experian.com] which will be shared between the three credit bureaus (equifax, transunion, experian).

          You can require that a phone number (provided by you) be called each time a credit application is processed using your information.

          You can set this up for 90-days, or 7-years. This also will remove your name from appearing on credit card junk mail. (A different process is involved in stopping the mails altogether.)

          (I became aware of this service only recently, af

    • I agree with another post that mentions smart cards. Much more difficult to create fraudulent transactions when you _must_ insert the card into a reader for authentication.

      But this is not about "banking" transactions. This is an almost unregulated gray area where the retailer is processing/managing it's own credit accounts. It sounds like those accounts stored individuals banking information along with their internal account info. (duhh!) This explains the ability for some bad guys to buy things elsewhe
      • by Misch (158807)
        Today's lesson: Don't get one of those store credit cards. You shouldn't be in debt to a retailer, ever.

        Most of the time, the "store card" is offered by a bank. CompUSA's credit card program is administered by HSBC, etc...
      • by ahmusch (777177)
        There is a gigantic difference between "managing your own accounts" and "processing your own transactions."

        One involves issuing payment instruments. One involves being responsible for accepting those transactions and settling with whomever did issue that payment instrument.

        It is frequently worthwhile for large, national merchants to maintain their own relationships to the issuing associations; they control all the data, and they don't have to pay a merchant processor a cut. Tater's Toe Service may only ha
    • The long term is separation of credit and banking from the Social Security system.
      How will that help?

      If congress were to pass a law that forbids banks from collecting social security numbers and mandates that they destroy all social security numbers already collected, has congress just solved the Identity Theft problem?

      (Hint: the answer is "no")
    • by ahmusch (777177)
      Banks have to collect Social Security numbers, because interest paid is income, and until sometime in the 70's/80's, all interest -- including credit card interest -- was deductible. Haven't you ever gotted a 1099-INT?

      You may as well advocate the elimination of private property while you're at it.
  • Example (Score:5, Insightful)

    by Renraku (518261) on Thursday March 29, 2007 @01:09PM (#18530321) Homepage
    Lets say that you're sitting at home one day. You get your credit card statement. Apparently your card is maxed out at $10,000. Your interest rate has tripled and the company is calling you wondering why you spent $10,000 in Bumfuck, India.

    Ok, so you're not responsible.

    How do you know how they got your info? It could have been from a call center, when you called about double billing you over and over. It could have been when you called your bank, which also has call centers in India. It could have been when you lost your card, someone found it.

    Point is, you probably will never know how they got your info. Only that they did. Even if you did find out, could you prove it in a court of law enough to sue TJX?

    • Re: (Score:3, Insightful)

      by stratjakt (596332)
      You dispute all charges, say you didn't make 'em, and you do this as soon as you find out, before anything can go to collections, and end up on a credit report. You have to be pretty negligent of your own finances to let it go that far.

      I have no pity for someone who doesn't at least look at their monthly statements.

      The risk to your credit is absolutely minimal if you pay attention, and call the 1-800 number on the back of the card to dispute the claims immediately.

      As for suing TJX, you wouldnt. You just g
      • by Thuktun (221615)

        In my case he didn't get a chance to spend more than a grand before I phoned the card in, so it was just petty theft.
        One wonders if there's a downside to waiting a skosh to see if the loser was going to rack up sufficient theft to make it a felony. If a loser cow-orker stole from me, I'd prefer to see him end up in PMITA prison, myself.
    • Re: (Score:2, Interesting)

      by 955301 (209856)
      yes, you can find out. Almost all companies who do lookups against card information have trace information. A court will be able to get that information.
    • 'How do you know how they got your info?'

      Well according to the article how they got the information by hacking TJX and using it to purchase large quantities of gift cards from Wal-Mart and Sam's Club. So in this case we don't have to wonder.

      'in filings with the U.S. Securities and Exchange Commission yesterday, the company said 45.6 million credit and debit card numbers were stolen from one of its systems [computerworld.com] over a period of more than 18 months by an unknown number of intruders'

      'in partnership with
    • Re: (Score:3, Interesting)

      by FuryG3 (113706)
      This EXACT situation happened to me.

      I was traveling internationally, lost my wallet, reported cards as stolen. Ended up finding the wallet (with money, yay!) but had to wait for my new cards to get to my house in the US, and then to me in Europe.

      Fast forward 2 weeks. I receive my cards in Europe and 2 days later I notice that there's a charge on one of my cards for something I didn't buy. And it was made BETWEEN the times that I reported my card "stolen" and when I activated my new card. The charges a
  • .. stolen data was used for purchases at Walmart in Florida [computerworld.com] by making fake credit cards.. it surely is a big organised crime
  • inevitable (Score:1, Insightful)

    by Anonymous Coward
    Without knowing any details, I would have to say this kind of thing is inevitable. TJX is probably another company which views it's IT staff as nothing more than a cost center with all the expertise they need as being a simple commodity. Why pay somebody with real experience and a proven track record a good salary when you can hire somebody with a bunch of certificates for 1/3 the cost? Or intimidate an H1-B employee into working 75 hours a week?

    I wonder if making the upper management personally respon
  • by rs232 (849320) on Thursday March 29, 2007 @01:21PM (#18530501)
    • by McNihil (612243)
      Just because their webserver is running IIS doesn't necessarely mean that everything else is. Interesting that they migrated over to W2k... well assuming they are hardcore FrontPage users that would explain why... and WebDAV might have been used to make it much simpler to compromise (been there got the t-shirt... will never ever use DAV again.)

      As much as I want to jump on Microsoft and nail a couple more in the coffin I doubt that it is an OS issue and more an inside job.
      • by rs232 (849320)

        What does the OS of their web server have to do with what OS thier internal billing systems are using?

        , Anonymous Coward

        It was the ecommerce server that was compromised, unless you know different.

        'Just because their webserver is running IIS doesn't necessarely mean that everything else is .. I doubt that it is an OS issue and more an inside job'

        What does their internal billing systems run on. How is it connected to the front end. How was the breach achieved. Did they break in through the front end.

        • by McNihil (612243)
          'Have you told the Florida police about this inside job.'

          Why would I need to... don't they have a brain?
    • Re: (Score:1, Insightful)

      by Anonymous Coward
      What does the OS of their web server have to do with what OS thier internal billing systems are using? I've worked plenty of places that had IIS hosted their "find a store near me" web site but used *nix or Big Iron for the systems that did real work such as billing or inventory control.
    • by roman_mir (125474)
      Wow, netcraft usefull for something unrelated to death sentences? Who would have thunk?
  • This affects some purchasers from the Canadian retailers Winners, and HomeSense, as per this CBC article [www.cbc.ca].

    More importantly, there has been recent arrests in Florida [www.cbc.ca] relating to this case.
    • by Dr Caleb (121505)
      It's my understanding from previous articles that Winners and Homesense store Interac card #s and PINs (but Canadian Interac cards were not breached). What possible business reason is there to store PINs, and why are they storing card information at all?
      • by kbahey (102895)
        My understanding is that Interac (debit cards for USians) are not affected, but credit card may have been stolen.

        A message [tjx.com] on TJX's corporate web site advise customers to take certain steps [tjx.com] (Canadian version), which include getting a credit report.

        I did that, since we shop at Winners occasionally, and did not find anything unusual, and our credit cards have not shown any unusual transactions.
  • by DragonPup (302885) on Thursday March 29, 2007 @01:32PM (#18530627)
    ..but decided not to tell anyone until late March, can we file a class action lawsuit for negligence if any of our card numbers were compromised, or illegally used?

  • by ehaggis (879721) on Thursday March 29, 2007 @01:39PM (#18530743) Homepage Journal
    Credit scores, reports and identity are in trouble in the US. It is a large pink elephant in the living room, but no one with any influence wants to admit it. Your credit record can be inaccurate due to:
    1. Credit Agency mistake
    2. Creditor error
    3. Criminal activity
    4. Poor security measures by xyz company
    5. ???

    With each of these is these problems, the onus for repair is on the customer / victim. There is no standard or easy resolution.

    • by rgriff59 (526951)

      ...the onus for repair is on the customer / victim...
      I find it quite telling that for a breach of more than 45 million card, they have, so far, spent 5 million dollars. To put this in another light, the value of each customer's data to TJX is slightly more than a dime? If that isn't a credibility gap...
  • Meanwhile... (Score:5, Insightful)

    by jeevesbond (1066726) on Thursday March 29, 2007 @02:03PM (#18531203) Homepage

    In other news a story on Microsoft's Get The FUD [microsoft.com] campaign mysteriously disappears, the title was: 'TJX Chooses Windows Over Linux for Reliability and Security'.

    I'm joking, but you never know. On a more serious note: what mystifies me is why these companies need to store customers credit card details at all?! Having had experience with POS (Point of Sale) I know that the system should keep these details long enough to complete a transaction, then it should delete it.

    Security starts with only keeping the information you need. Courts should be questioning why these companies retained this data in the first place!

    • by SuluSulu (1039126)

      what mystifies me is why these companies need to store customers credit card details at all?!

      It's used to help prevent credit card fraud. I've worked in retail and I have had to deal with it myself to a small extent. It's one of the reasons that many places will only refund money onto the card you made the purchase on. (Also so that they have proof that the money was refunded and the customer can see it refunded on their statement) The other reason is traceability. Having things like the credit card


      • Yes, chargebacks can be a problem. But your other points are not unversial. For me, there is little need to keep the credit card information once the transaction has been completed. The only piece of info that I store is the Transaction ID. I never store the Authorization number. Once the transaction is auth'ed, there is no point.

        Refunds don't have to be made the the same credit card. But if I wanted to enforce that as a policy, I could go back to my processor (VeriSign) and lookup the the credit ca
        • by ahmusch (777177)
          The difference is that VeriSign's your merchant processor. The merchant processor has the responsibility to keep that information throughout the transaction's life cycle.

          TJ Maxx is their own merchant processor. Therefore, they needed to keep all the information relevant for the transaction.

          Now, did they keep information they didn't need to keep longer than they should? It certainly seems that way.
    • by mdm-adph (1030332)

      I'm joking, but you never know. On a more serious note: what mystifies me is why these companies need to store customers credit card details at all?! Having had experience with POS (Point of Sale) I know that the system should keep these details long enough to complete a transaction, then it should delete it.

      Because they have to report it to the government in order to keep track of everything you do as part of a global information dragnet on every living man, woman, and child in the world?

      Nah....

    • The only answer I can think of is for tracking purposes. If your credit card is stolen, they can track purchases made by it.

      The solution to allow tracking, but keep hackers at bay is to cryptographically hash the card number with a one-way hash and store that after the transaction is completed. Then, if Joe's identity is stolen, they could hash Joe's card number and compare it in the database with purchases. But if the database is broken into, the hackers just have useless hashes instead of credit card n
      • by mrcaseyj (902945)
        >The solution to allow tracking, but keep hackers at bay is to cryptographically hash the card number...

        That's what I was going to say. As I was writing a post to tell people to mod you up I realized why it might not do much good. The credit card number is only 16 digits and isn't completely random. This means it would probably be practical to make a rainbow table with the hash of every likely card number. A salt unique to the merchant might help especially if it could be kept from the hackers. A salt

    • by Eklypz (731361)
      Actually, they were violating regulations by keeping the credit card data
      • Re: (Score:3, Informative)

        by Kalriath (849904)
        Actually, you're only violating regs if you keep the CVV2 number (three digit number on the back) - PCI DSS says you dump that as soon as you verify it, but you do not have to with the credit card number (otherwise how do you expect PayPal et. al. to work?)
  • This is what happens when you buy Microsoft's line about how Windows is adequate for anything other than video games.

    And Vista's so slow and has so many driver problems, it can't even do that very well.
    • That's right, because this is Slashdot and Microsoft is responsible for 100% of the world's problems. Amazing how some folks have less than 1 degree of separation between a problem of ANY sort and Microsoft...
  • I post this fleeting thought here to see if this is viable, and maybe spark a thought in the minds of Credit Card companies.

    What if our CC numbers weren't so persistant. I have cards in my wallet that don't expire for 3 or 4 years. Why not issue a new card every 12 months? That way, people who steal credit cards from these systems only have at most 12 months to use them.

    One possible problem: recurring bills. Instead of the one time use cards that Amex used to have (I REALLY liked those) or that Discover
    • A better solution would be constantly changing credit card numbers. Utilizing something like the RSA tokens in combination with a credit card number would eliminate everything except physical theft of your card. Instead of having your credit card be static 4444 4444 4444 4444 it would be 4444 4444 4444 4444 XXXXXX where the x's change every minute. A retailer stores the transaction time (synchronized of course), and the card number at the time of the sale. Utilizing the widely available RSA token techno
    • Ok slashdotters. Poke your holes!
      Oh, gee, I dunno. Maybe that a fraudster can do a lot of damage in 12 months?
  • by STrinity (723872) on Thursday March 29, 2007 @03:20PM (#18532765) Homepage
    1) Get job with TJX 2) Steal customer credit card information 3) PROFIT!
  • Bogus transactions appeared on my card last week. The transactions looked pretty much like the kind of purchases I do all the time anyway but somehow the card company (NatWest) security department noticed it was happening and blocked the card pretty quick. I shop at TK Maxx all the time and when I phoned them a couple months ago they said we can't tell you anything but look out for any fraud on your card. Well it happened so called them back yesterday and they said yep it was likely my card details came out
  • Make the corporation,its board, and officers personally responsible for lost data....

    As in Bank A looses 10K records of personal data which results in 100M in fraudulent charges. Bank A has to pay the merchants and CC companies 100M.....

    You'll see data protections and security go up so fast you'll get whiplash....

    (What? Hold people responsible?)

You can bring any calculator you like to the midterm, as long as it doesn't dim the lights when you turn it on. -- Hepler, Systems Design 182

Working...