Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Businesses Canada United States

Home Depot Confirms Breach of Its Payment Systems 111

itwbennett writes: Home Depot confirmed Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the U.S. and Canada since April. There's no evidence yet that debit card PINs had been compromised, the company said, though it is still figuring out the scope and scale of the attacks. Home Depot is offering a free year of identity protection services for anyone who used a payment card in one of their stores since the beginning of April.
This discussion has been archived. No new comments can be posted.

Home Depot Confirms Breach of Its Payment Systems

Comments Filter:
  • Yet another major computer security breach at a big retailer, compromising the payment details of uncountable customers.

    It seems to me that the core problem is that companies won't hire actual experienced hackers as security consultants; for some reason, the idea terrifies them. Instead, they hire bozos that possess some worthless "security" certificate (like CompTIA).

    Or even worse, they'll hire a hacker that was dumb enough to get caught and go to jail for his actions. For some reason, that gives them

    • by Anonymous Coward

      You for got to mention How L33t you are, Anonymous I iz

    • by Agares ( 1890982 )
      I agree, however the major issue here is that there are not enough hackers to go around. So unfortunately security will always be a mess I suppose.
    • by ArchieBunker ( 132337 ) on Monday September 08, 2014 @11:35PM (#47858963)

      Remember when cash registers used to be glorified calculators? Now they are cheap PCs running poorly configured operating systems. You have tons of attack vectors open from USB ports to unneeded services. That and credit card companies are too fucking cheap to switch to chip and pin. The only reason the rest of world switched was because the companies were forced to. Not in the good old USA.

      • by wolrahnaes ( 632574 ) <sean.seanharlow@info> on Monday September 08, 2014 @11:47PM (#47859029) Homepage Journal

        Now they are cheap PCs running poorly configured operating systems.

        The important part. Brand new systems are still being deployed with Windows XP. Anyone who doesn't see how fucking idiotic that is should never be allowed to make an IT-related decision again, but unfortunately the people who make these decisions don't know and aren't held accountable for their stupidity.

        Most of the local banks have installed new Diebold ATMs that scan checks automatically. I saw one reboot the other day. Take a wild guess what OS...

        Fuck "enterprise IT" and the bullshit anti-update mentality. If you can't update, you're doing it wrong.

        • Now they are cheap PCs running poorly configured operating systems.

          The important part. Brand new systems are still being deployed with Windows XP. Anyone who doesn't see how fucking idiotic that is should never be allowed to make an IT-related decision again, but unfortunately the people who make these decisions don't know and aren't held accountable for their stupidity.

          Most of the local banks have installed new Diebold ATMs that scan checks automatically. I saw one reboot the other day. Take a wild guess what OS...

          Fuck "enterprise IT" and the bullshit anti-update mentality. If you can't update, you're doing it wrong.

          XP would be an upgrade from my retail experience everything from sco unixware, DrDOS, Netware, to IBM PCDOS is still used.

          • In 2012 I worked at a discount retailer whose cash registers ran Windows 98. (Yes, the registers sucked.) The "office computer" ran Windows 2000. The Win2k machine (an subsequently all registers) were internet-connected, and the 2k machine had data from all the cash registers. I'd like to think the Win2k machine was strictly used on a properly secured VPN with the corporate office... but I doubt it.
          • Why would you want to run an insecure OS like XP instead of an easily secured one like Unixware or PCDOS?

            Being pretty doesn't make it an upgrade.

            • by Aaden42 ( 198257 )

              Being pretty doesn’t make it an upgrade.

              No, but being easier for barely capable techs to cobble something together that “works” in less time is considered an upgrade.

              Remember: IT security is a separate cost of doing business. Cutting IT security costs improves the bottom line. Increasing costs for “only” security has no business benefit.

        • Give me a break. I'm no great fan of Windows, but even if they used one of the more secure versions of Linux, their own software is not exactly known for stellar security.

          Reference the scandals some years back regarding their voting machines...
          • Did I ever say I had a problem with Windows overall? I don't, at least no more than any other ordinary OS. It's that second part...the one that starts with an X and ends with a P. That's the problem. Like I said, deploying new Windows XP is fucking stupid.

            Windows itself is a fine core platform these days. The key is these days, meaning not a full major revision and two lesser (but hard to call minor) revisions ago.

            I'd still personally prefer Linux or a BSD, but I'd have a hard time making a purely tech

        • Fuck "enterprise IT" and the bullshit anti-update mentality. If you can't update, you're doing it wrong.

          Fuck software "engineering" and the bullshit always-update mentality. Build shit that works so that it can be used 20 years later without issues. If I have to update, YOU are doing it wrong.

          I say this as someone who has written software. Oddly enough, it was in C, has never had any exploits, has not needed updates, and has been running in a hostile environment since 1999, and is still just as reliable now as it was then (never needs to be restarted/rebooted, no memory leaks, etc). And it is not Hello World.

      • by Vellmont ( 569020 ) on Tuesday September 09, 2014 @12:14AM (#47859149) Homepage

        That and credit card companies are too fucking cheap to switch to chip and pin. The only reason the rest of world switched was because the companies were forced to. Not in the good old USA.
        Well, you're going to start getting your (and my) wish starting around October 2015. That's the date the liability shifts. Then the liability shifts to the party implementing the least technology. So if the card issuer issues a chip and pin card, and the retailer has only swipe, the retailer is responsible for any fraud from customers with chip and pin cards. If the retailer has a chip and pin machine, but the card issuer has only swipe, then the card issuer is liable.

        So essentially you're going to start seeing big retailers upgrade to chip and pin machines sometime around Oct 2015. I'm sure it'll be a slow process, with small retailers taking many years to finally upgrade. But it'll happen.

        • by mjwx ( 966435 )

          That and credit card companies are too fucking cheap to switch to chip and pin. The only reason the rest of world switched was because the companies were forced to. Not in the good old USA.
          Well, you're going to start getting your (and my) wish starting around October 2015. That's the date the liability shifts. Then the liability shifts to the party implementing the least technology. So if the card issuer issues a chip and pin card, and the retailer has only swipe, the retailer is responsible for any fraud from customers with chip and pin cards. If the retailer has a chip and pin machine, but the card issuer has only swipe, then the card issuer is liable.

          So essentially you're going to start seeing big retailers upgrade to chip and pin machines sometime around Oct 2015. I'm sure it'll be a slow process, with small retailers taking many years to finally upgrade. But it'll happen.

          This hinges on the cost of liability being greater than the cost of upgrading.

          You can bet that Home Depot or Walmart will find a way to push this cost onto the customer (and offer optional insurance for a nominal fee to avoid it).

          In Europe the governments had to force retailers _AND_ banks to upgrade. Not that EMV (Chip and Pin is the UK/Ireland brand name) has improved security any, it's pretty much as vulnerable as the mag stripe (successful attacks on EMV started in 2006 in the UK). The problem wil

          • This hinges on the cost of liability being greater than the cost of upgrading.

            It is. Far greater.

            You can bet that Home Depot or Walmart will find a way to push this cost onto the customer

            Home Depot has already installed chip-capable terminals (I use them all the time). Walmart already has in many locations as well.

            • Comment removed based on user account deletion
              • The cost of everything is always passed to the consumer.

                Tautologically true, but misses the point.

                The cost of fraud gets passed to the consumer, also, either through higher bank card fees and rates, or through higher cost of goods at the merchant (mostly the latter). When merchants save money on fraud costs by spending money on new chip-capable terminals, that savings ultimately gets passed to the consumer as well.

          • You can bet that Home Depot or Walmart will find a way to push this cost onto the customer (and offer optional insurance for a nominal fee to avoid it).

            They would have to ask each customer. I should say lost customer, because who is going to buy anything when the cashier's first words are, "Thanks for shopping at Home Depot. Would you like to buy liability insurance in case we get hacked?"

          • by deKernel ( 65640 )

            So let me get the story straight: the EU forced people to upgrade (which cost big buck and I am certain all those costs were passed to the customers), and then you seem to acknowledge that it really didn't accomplish much. So, what was the goal of the exercise? Am I missing something?

        • you're going to start seeing big retailers upgrade to chip and pin machines sometime around Oct 2015.

          So far only one retailer that I shop is chip-and-pin ready: Walmart. About six months ago, they started asking me to insert, rather than swipe, my chipped card.

          • you're going to start seeing big retailers upgrade to chip and pin machines sometime around Oct 2015.

            So far only one retailer that I shop is chip-and-pin ready: Walmart. About six months ago, they started asking me to insert, rather than swipe, my chipped card.

            I sometimes do some contract work for POS companies. I write little demo apps to help them sell their terminals to merchants. The cheapest stuff coming out the door right now all seems to have chip and pin built into it. So don't worry, everyone is going that way. T-Mo uses it, my Target location has switched to chip and pin capable terminals as of 3 weeks ago, too.

          • Come on up to Canada, we're all chip&pin ready and mostly tap&pay as well.

        • If the retailer has a chip and pin machine, but the card issuer has only swipe, then the card issuer is liable.

          One correction: The US isn't going to Chip and PIN, but Chip and Signature.

          Given the federal laws that prevent issuers from placing (significant) liability on cardholders, there's less motivation for imposing the inconvenience of PINs (you can debate whether signature or PIN is more convenient, but US consumers have traditionally preferred the former). In the UK, for example, Chip & PIN has allowed banks to shift the liability almost completely to the cardholder, so in that sense US cardholders are be

        • Comment removed based on user account deletion
      • by Archfeld ( 6757 ) *

        I disagree, even XP can be made secure. The problem is the network implementation and the proprietary software that runs on the admittedly PIGGY-BACK of XP. More and more the routers and silly appliances with hard coded firmware passwords and insecure 3rd party installation is to blame. I have to agree on the credit card issue though. Isn't it odd that the companies responsible for credit DB's and ratings also run the so-called identity protection sites ?? That seems like a conflict of interest to me.

      • by mjwx ( 966435 )

        Remember when cash registers used to be glorified calculators? Now they are cheap PCs running poorly configured operating systems. You have tons of attack vectors open from USB ports to unneeded services.

        This is pretty much why they wont hire anyone who knows dick about security.

        The first thing they'll tell them is the unpatched Windows XP box running ShitPOS(TM) is inviting an attack. The problem with this is that the POS terminals they got were cheap and the director in charge of that procurement got a good bonus for getting the POS system in under budget. Getting a secure system costs money, time (which costs money) and effort (which isn't cheap either). This means the director and project manager can

      • That and credit card companies are too fucking cheap to switch to chip and pin. The only reason the rest of world switched was because the companies were forced to. Not in the good old USA.

        I think that's changing, maybe the mess is finally more expensive than a preemptive fix.

        My bank cancelled+replaced my credit card last week (without warning: they said it was because the # was recently reported stolen, I'm guessing it was the local supermarket chain but they won't say), and the replacement has chip

      • by Megane ( 129182 )

        FWIW, some places now request your postal zip code as a sort-of PIN, particularly unattended pay-at-the-pump gasoline. At first it sounds silly, but when you think about it, if someone scammed your credit card number by swiping the card track data, or out of a database, they're not likely to have your zip code too. (I suppose if they intercepted the zip-as-PIN they would have it, so hopefully it goes down the same encrypted route as debit PINs.)

        If someone stole your wallet, sure, they would have your zip c

    • by raymorris ( 2726007 ) on Monday September 08, 2014 @11:51PM (#47859051) Journal

      I understand where you're coming from. As you may know, I've been doing infosec for a long time, and I know the difference between "compliant" and "secure". I'm rather surprised you chose CompTIA Security+ as your example of a bad security certification. The new one especially is quite comprehensive, in my view. Not that a single certification can ensure that a candidate is ready to perform any and all jobs related to security, but I'd say that if even 10% of the people designing and maintaining these systems had enough knowledge to pass Security+, we'd be in a lot better shape.

      • but I'd say that if even 10% of the people designing and maintaining these systems had enough knowledge to pass Security+, we'd be in a lot better shape.

        I am sure all of them could pass it if they studied for it. That is why all certifications are useless. With enough studying, almost anyone can pass it without understanding the material, just regurgitating facts.

        If you could force someone to take and pass such a test without studying, THEN your statement would be useful.

        • > I am sure all of them could pass it if they studied for it. That is why all certifications are uselessuselessb

          With enough study, you can pass the exams to be a medical doctor. That is why exams to certify that medical doctors know what they are doing are useless. Unless of course you want someone who knows about the subject at hand. I kind of want a doctor, and a security professional, who have studied their fields. Sorry you couldn't pass.

          > With enough studying, almost anyone can pass i

          • With enough study, you can pass the exams to be a medical doctor.

            That is true... and I have had many bad experiences with medical doctors. Just because someone can pass a test immediately after studying for it, that does NOT mean that they understand whatever it is that they just passed.

            I kind of want a doctor, and a security professional, who have studied their fields.

            I want more than just studying. I want understanding of the material.

            Sorry you couldn't pass.

            Heh. You are funny. I passed Security+, Server+, CISSP, etc all without breaking a book to specifically study for all of those certifications. I have read lots of books. I have learned lots of stuff. Knowing that stuff w

    • Comment removed based on user account deletion
    • It seems to me that the core problem is that companies won't hire actual experienced hackers

      Most likely the problem was the exact opposite: They did hire a black hat, and this was an inside job.

      • by ruir ( 2709173 )
        No need to hire black hats. On this present economy and the mentality of the get the cheaper you can, they are probably paying students or some "Windows" experts to take care of their systems. This smells more of incompetence than of an inside job.
      • by Jawnn ( 445279 )

        It seems to me that the core problem is that companies won't hire actual experienced hackers

        Most likely the problem was the exact opposite: They did hire a black hat, and this was an inside job.

        No. If history is any indicator, and it usually is, this is just another case of system admin ass-hattery. In other words, bad practices; giving LAN access to the HVAC contractor, allowing remote desktop access by the POS system contractor, etc. All things we've seen before in other high-profile breaches.

  • by Anonymous Coward

    Even chips are bullshit. Why aren't CCs issuing one time tokens per a transaction - this rendering subsequent transactions useless? (Or tying the token to a retailer for subscriptions / etc)

    • by Anubis IV ( 1279820 ) on Tuesday September 09, 2014 @12:18AM (#47859163)

      Why aren't CCs issuing one time tokens per a transaction - this rendering subsequent transactions useless? (Or tying the token to a retailer for subscriptions / etc)

      Hopefully someone brings out a system like that soon. [macrumors.com]

    • by dgatwood ( 11270 ) on Tuesday September 09, 2014 @02:30AM (#47859637) Homepage Journal

      Even chips are bullshit. Why aren't CCs issuing one time tokens per a transaction - this rendering subsequent transactions useless? (Or tying the token to a retailer for subscriptions / etc)

      You'd have to do better than that. If the payment terminal is compromised, an attacker could just sit there and wait for a card to be available at one of the payment terminals, then process two transactions in a row very quickly, one of which is the real one, and the other of which is an arbitrary transaction. There's a fundamental law in computing—not sure if it has a name—that goes something like this: If you cannot fully trust both endpoints of a communication channel, you cannot trust the communication channel itself. Period.

      The only way to really improve the situation is to have credit cards treat the payment terminal as an untrusted network connection. Put a screen on the card itself, and require the user to push a button on the card itself to approve the transaction. Then use some form of PK crypto in the device itself to sign the transaction and send the response back to the payment processor's servers, which can then send a confirmation code to the register as proof that the transaction was accepted.

      And no, I don't mean cell phones here. Cell phone payment systems certainly have the potential to be an easier way of paying for things, but security-wise, they just replace one attack target with another, without any obvious security benefit. Why? Because they're general-purpose computers that are constantly in use for other purposes like web browsing, so if they contain any security holes, the risk of them getting compromised is non-negligible.

      More to the point, the risk of compromise for a cell phone is orders of magnitude higher than the risk of somebody finding a bug in a specialized card in your billfold and attacking it using nothing but NFC (because an attack on a cell phone doesn't require you to be in the same country as the victim, much less within a few feet).

      And assuming all things are equal, the odds of a cell phone being compromised should be higher than the odds of a payment terminal being compromised (ignoring the "physically swap it out" risk), because the payment terminals should be segregated onto their own private network, and shouldn't be communicating with unrelated Internet servers for unrelated purposes. This does not appear to be the case in practice (as far as we know), but then again, until enough payments happen on cell phones, they won't be a high-priority target, so such comparisons may or may not really be valid.

      Now it is theoretically possible to make a cell-phone-based solution as secure as a card with a screen, but the minimum requirements would be:

      • A separate CPU that handles the transaction processing and signing.
      • A means for that CPU to take over the display and input system in such a way that guarantees that the data shown on the screen is from that crypto chip even if the software running on the phone's main CPU is completely compromised.
      • A physical light on the front panel of the device to indicate that the data on the screen is coming from the payment chip.

      Anything short of that improves security only to the extent that the odds of simultaneously compromising a payment terminal and the phone that's talking to it are less than the odds of compromising one or the other, and there's a small chance that the customer might notice if the screens don't match, so an attacker really ought to compromise both of them. With that said, when there's a mass compromise of the payment systems of a major national company, it doesn't take a very high percentage of compromised cell phones before you would start seeing situations where both devices are compromised, at which point the cell phone doesn't make things appreciably more secure than a chip-and-pin system, which is, in turn, not all that much more secure than a magstripe system, whereas a mostly dumb crypto card with a screen and a pushbutton does.

      • It is easier than that; the token needs to have merchant, amount, date/time hashed in; you approve that information before entering your pin.

        There are hard issues... like what to do with credit reports that rely on a non-random 9-digit social security number as keys to the kingdom, but securing the transaction between consumer, merchant, and bank isn't that hard.

        • by dgatwood ( 11270 )

          No, it really isn't easier than that. If an attacker is in control of the device that controls the screen, they can make it show you anything that they want, including showing the right text for the transaction you're actually making. Then, when you enter the PIN, they can perform your transaction, and repeat the process for a second one using the PIN data that they already captured. If a device vendor manages to somehow make it physically impossible to perform two transactions without entering the PIN

  • US businesses are more concerned about raking in the money than they are about the security of the accounts of the people from which they suck the money.

    .

    Film at 11.

  • Just use cash instead of plastic. Go to your bank, get real money, QED. Cashiers are shocked when I use a fifty or hundred dollar bill to pay for a purchase.
    • by crioca ( 1394491 )
      A couple of months back I payed for a bunch of Ikea stuff with 10 $100 notes. It was so cash. Literally.
    • by cdrudge ( 68377 )

      And a half hour later after the cashier has marked every bill, held it up to the light to observe ALL the security features, and then had to call two levels of management over to repeat the process to authorize accepting $50s or $100s.

      Maybe it wasn't quite a half hour, but the above happened to me recently. The guy in front of me was paying with several $100s. It too far too long to complete the transaction.

      • It's become ridiculous, considering that $100 doesn't buy crap. I can't even fill a cart at the grocery store with $100 unless we loaded up on coupons.
      • by k6mfw ( 1182893 )

        repeat the process to authorize accepting $50s or $100s.

        yes, give a $100 bill at any store and they will spend some time examining it. Except in Las Vegas, that gets as much attention as a quarter (unless things have changed in past 10 years). I read leading counterfeit bills are $10. $100 attract attention, $1 not worth time counterfeiting, but the $10 bill is good candidate because Treasury Dept is always changing the colors so nobody really keeps track on what an authentic bill looks like.

        But how does a suspected counterfeit feels like? the real bills are s

        • by cdrudge ( 68377 )

          I read leading counterfeit bills are $10. $100 attract attention, $1 not worth time counterfeiting, but the $10 bill is good candidate because Treasury Dept is always changing the colors so nobody really keeps track on what an authentic bill looks like.

          The Treasury Dept in 1998 said $20 get 5x the number of counterfeits as $10 but $100 has 3x the value of counterfeit notes. Source [federalreserve.gov], page 53

          I wouldn't imagine the numbers have changed that much since than. I had always heard that $20s are the most frequently

          • by k6mfw ( 1182893 )
            interesting document, thanks for link. heh, come to this thread about payment systems getting hacked and veer off into counterfeit money. I don't shop Home Depot often, last time was there bought electrical supplies and paid cash (with real money of course). I'd hate if I used my CC and then get up the next day and read about Home Depot.
    • by Panaflex ( 13191 )

      Agreed. I started using cash a few months ago so that I could keep better track of my spending, but the side benefit is a smaller digital footprint. I don't live in a high crime area, so the tradeoff is mostly positive.

  • by Etherwalk ( 681268 ) on Tuesday September 09, 2014 @01:39AM (#47859463)

    Home Depot deployed new card readers at all their stores (of the ones I saw at least) almost overnight shortly after the target breach. I had guessed it was in response to the breach to beef up security...

    But it looks like it was the new ones that were compromised... (or else it was coincidental).

    • Home Depot deployed new card readers at all their stores (of the ones I saw at least) almost overnight shortly after the target breach. I had guessed it was in response to the breach to beef up security...

      But it looks like it was the new ones that were compromised... (or else it was coincidental).

      I doubt the new readers had any relationship to the Target breach. Home Depot was just being proactive and getting the new tech in well ahead of the liability shift, which is coming late next year. The Home Depot near me got them over a year before the Target breach. I know because I started using my Google Wallet there in late 2011.

      The fundamental problems, though, depend on the cards, not just the terminals. As long as you're swiping a magnetic stripe you're vulnerable because (a) the POS system receive

    • But are they implemented?

      My credit card company has just recently send new cards with the microchip.
      Now I have seen the chip reader on 80% of the card readers I have seen.
      And only Wal-mart has it implemented and working. Target has the new reader, but it isn't implemented.

      So the upgrading of the card readers happened to make people feel good, however like so many other IT projects their implementation was half assed.

      • by tlhIngan ( 30335 )

        My credit card company has just recently send new cards with the microchip.
        Now I have seen the chip reader on 80% of the card readers I have seen.
        And only Wal-mart has it implemented and working. Target has the new reader, but it isn't implemented.

        It probably IS implemented, it's just waiting on the processor to actually flip the switch to enable the chip reader.

        It's a bit more involved than just swapping out old hardware with new hardware - the whole operation of chip+pin is completely different. And it's

  • Corporations treat security as an after thought. It shows up in the expense column, nothing in the revenue/income column. The top corporations do not see any benefit to security expenses. It is as idiotic as not installing doors to help customers enter the store easier.

    The CEO's bonus must be docked, the CIO must be fired, all the top executives who were in the decision chain of the security decisions must have their bonus forfeited, pay docked and a few of them should be fired too, Unless we see a strong

  • My experience with Home Depot has been extremely low quality products. Your experience my differ, but I stopped shopping there long ago and now only shop at local, family-owned shops.
    • Most local family-owned shops are effectively Ace or one of the other franchises. While not all the inventory comes from the franchiser, it's quality is usually lower to be at the same retail price. Lowes seems to have higher quality, higher-priced products consistently, but it seems to miss the balance on the value scale.

      I bought a Husky tool cabinet last year for under $300, where the comparable product from Lowes was $700. Lowes was hands-down better in terms of construction quality, design, and featu

  • I've shopped at our local Home Depot, but here in Canada everything's been chip-and-PIN for quite some time. So... am I at risk? It's not clear from the news media whether or not the chip-and-PIN system has protected me from this breach.

  • by Walking The Walk ( 1003312 ) on Tuesday September 09, 2014 @09:42AM (#47861295)

    I'm in Canada, and we've been using chip cards for a few years now. I just called my bank 45 minutes ago after noticing a fraudulent charge on my credit card from August 30th. Since I bought a bunch of stuff at Home Depot in May/June, I'm assuming they managed to clone my card from the stolen data. The charge was only $4.56, at a gas station halfway across the country, so I would guess that someone was testing the clone to see if it was a valid card number (maybe testing one number from a batch of 100s or 1000s, to see if the numbers were legit.)

    Just so we're clear, I'm not saying the fraudulent purchase itself was made using the chip. I only ever use chip + pin when making purchases, but I suppose a cloned card could use NFC (eg: PayWay) for a purchase that small, or even just the magstripe, neither of which requires them to have compromised my pin. My point is that I thought I was being safe using chip + pin, but still got hit regardless. Fortunately, banks seem to be good about this sort of thing, and my new card is on its way.

    • I've twice taken random trips and had a phone call waiting for me when I get home from my CC company asking if I'm the one who made the random purchases in question because they don't match my normal profile and they want to prevent fraud.

      I also only use chip&pin or NFC for payments (also Canadian).

  • If I'm already receiving monitoring from another database breach, is there a way to enqueue this monitoring so it goes in effect after that year lapses? Signs of bad systems...
  • These companies get cheap and higher less capable IT workers for less money and this is the result. Home Depot, this liability will cost you far more than paying for better talent in the first place.
  • Target offered a free year of credit monitoring after last year's breach and now this. As long as one major retailer makes the same mistake every year we'll all have free credit monitoring for life!

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...