Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

TJX Fires Employee For Disclosing Vulnerability 217

I Don't Believe in Imaginary Property writes "A TJX employee was fired for an online post mentioning that TJX hasn't beefed up security after the recent, massive data breach that saw 94 million credit card numbers copied by criminals and money from their accounts stolen. The employee mentioned that, at first, their usernames were the same as their passwords. After they required stronger passwords, some managers complained, so they 'compromised' by allowing blank passwords. The whistleblower said he discussed his concerns with management, but that it was like talking to a brick wall. In spite of the weak internal security, TJX now has a firm that scours the internet to find bad things posted about them, which is how they found the message and fired him for it. Too bad they don't appear to have hired anyone to beef up operational security or to convince people to use strong passwords."
This discussion has been archived. No new comments can be posted.

TJX Fires Employee For Disclosing Vulnerability

Comments Filter:
  • um duh (Score:3, Insightful)

    by Brian Gordon ( 987471 ) on Tuesday May 27, 2008 @03:59PM (#23562109)
    If you non-anonymously whistleblow on your own company what do you expect..
    • RTFA (Score:5, Informative)

      by Anonymous Coward on Tuesday May 27, 2008 @04:06PM (#23562225)
      "So last August, Benson took to Sla.ckers.org, a website dedicated to web application security, and began anonymously reporting the shoddy practices in this user forum."
      • Re:RTFA (Score:5, Informative)

        by TubeSteak ( 669689 ) on Tuesday May 27, 2008 @04:26PM (#23562553) Journal

        began anonymously reporting the shoddy practices in this user forum."
        He was the squeaky wheel at the store, then went online and squeaked some more.
        http://ha.ckers.org/blog/20080522/tjx-whistle-blower/ [ckers.org]

        They tracked him down by IP (we're still not completely sure how they did this, but we think it may have to do with a DynDNS account he uses), contacted his ISP to find out who he was, brought him into the office, questioned him about what he found, asked for him to write down his thoughts on how to fix the issues and then promptly fired him.
        Long story short: You aren't anonymous unless you're going through an anonymous overseas proxy or three.
        At least it'll be harder to get your IP from a foreign company.
        • Re:RTFA (Score:5, Interesting)

          by moxley ( 895517 ) on Tuesday May 27, 2008 @04:32PM (#23562617)
          However they found out who he was it can't have been legal.

          He should fixate on this and sue them.
          • Re:RTFA (Score:5, Insightful)

            by immcintosh ( 1089551 ) <slashdot@ianmcin ... inus threevowels> on Tuesday May 27, 2008 @04:47PM (#23562815) Homepage
            If there's anybody he can sue, it would only be his ISP for divulging his information without his permission and also without a warrant. While the company was certainly out of line in the lengths they went through to accomplish this, there's nothing ILLEGAL about discovering an internet persona's true identity. They were perfectly free to ask all the questions they did. Whether the ISP had any right to divulge that information is another matter I don't really care to guess on.
            • Re:RTFA (Score:5, Insightful)

              by mwvdlee ( 775178 ) on Tuesday May 27, 2008 @05:05PM (#23563069) Homepage
              Asking somebody to break the law can be illegal too, depending on the exact details.
              Trouble is, due to their own well-documented incompetence in security, they'd have a pretty good chance to claim they simply didn't know it was illegal.
              • Re:RTFA (Score:5, Insightful)

                by compro01 ( 777531 ) on Tuesday May 27, 2008 @05:12PM (#23563141)
                And whatever happened to "ignorance of the law is no excuse"? One would think that should be doubly so for large corporations with legal departments to tell them what is and isn't legal.
                • Re:RTFA (Score:5, Insightful)

                  by ConceptJunkie ( 24823 ) on Tuesday May 27, 2008 @05:45PM (#23563577) Homepage Journal
                  You're assuming large corporations are actually subject to the law.
                • Re:RTFA (Score:4, Interesting)

                  by frank_adrian314159 ( 469671 ) on Tuesday May 27, 2008 @06:01PM (#23563809) Homepage
                  Oddly enough, even though ignorance of the law is not an excuse, it can be a mitigating factor. If you get caught, you're more likely to get a reduced sentence if what you are charged with is not obviously illegal. If you check and find out an action is illegal and then get caught, you're more likely to get the book thrown at you. It's sort like patent infringement. If you do a search, find a device/process you're infringing upon, and use it anyway, it's willful infringement and the patent holder can get triple damages; if you don't know it's infringement, you only get normal damages. As such, managers are advised to ask about legality sparingly.

                  P.S. I am not an attorney. Do not take this as valid legal advice.

              • Re: (Score:3, Interesting)

                by RockDoctor ( 15477 )

                Trouble is, due to their own well-documented incompetence in security, they'd have a pretty good chance to claim they simply didn't know it was illegal.
                Do TJX (whoever they are) have any divisions outside America, so that I know who to avoid?
            • Re:RTFA (Score:5, Interesting)

              by Zero__Kelvin ( 151819 ) on Tuesday May 27, 2008 @06:19PM (#23564035) Homepage
              It seems likely to me that he is protected by the Whistle Blower Law [wikipedia.org], since he posted to the thread:

              News and Links

              If you have some interesting news or want to throw up a link to discuss it, here's the place. Anything is okay, even shameless vendor launches (since that is often applicable to what we work on).
              He tried to resolve it internally, and when the internal approach failed, he posted it to a news portion of the sla.ckers.org [ckers.org] website.

              I concede that IANAL, so of course, I could be wrong, however the courts have already ruled that blogs and other web based news sites qualify under protections provided to the media.
          • Re: (Score:2, Interesting)

            Are there any blanket consumer protection laws with regards to what information a provider can release to a third party? I always thought that it was completely at the discretion of the provider as to what information they can disclose, and for what reason. I hope I'm wrong.
            • Re:RTFA (Score:5, Informative)

              by conlaw ( 983784 ) on Tuesday May 27, 2008 @05:04PM (#23563063)
              AFAIK, there is no federal law that would apply in this situation and the only Kansas statute that I could find on whistleblowing applies only to government employees. However, there appear to be a couple of Kansas cases holding that firing someone for whistleblowing is against public policy.
        • Re: (Score:3, Insightful)

          by geekoid ( 135745 )
          He could have posted from different places, and they wouldn't have been able to do squat...hell, even using a friends computer would probably be enough.

          It also makes me wonder what laws TJX may have broken trying to get that information.
    • Re:um duh (Score:5, Insightful)

      by gnosi ( 893875 ) on Tuesday May 27, 2008 @04:07PM (#23562243)
      Have they not learned from the others that have gone on before them. It is not the original error that will get you, but how you cover up your error that does.

      Anyone remember Nixon... and a few others.

      -- sig.com not found post halted
    • by JSBiff ( 87824 ) on Tuesday May 27, 2008 @04:11PM (#23562301) Journal
      To protect whistleblowers, aren't there? Although, that might only be in the government, and maybe government contractors. Not sure if it extends to the private sector.

      The thing I'm puzzled about is, I thought that the electronic payment networks (MasterCard, Visa, Discover, Amex, etc) had very specific requirements for data security, including audits, which filter down to merchants (I realize that merchants don't generally do business directly with the networks [unless, maybe, they're Walmart or Sears], and instead go through intermediate companies that 'resell' the network services, but I thought the security requirements, and audit regimen, bubble down through the whole hierarchy?)
      • by athakur999 ( 44340 ) on Tuesday May 27, 2008 @04:26PM (#23562545) Journal
        The whistleblower protection laws in the USA protect an employee from termination for reporting the employer acting illegally. Shoddy security may be stupid but I don't know if it's illegal or not. Also, the employee needs to be reporting to the proper authority, not a random Internet forum.

        • by kmahan ( 80459 ) on Tuesday May 27, 2008 @04:44PM (#23562783)
          And who would the "proper authority" be in this case? His management doesn't care.

          Apparently PCI Compliance doesn't allow for input from the "little people" -- or would someone care to post a link that allows for submitting information to them?
          • Re: (Score:3, Interesting)

            by colinbrash ( 938368 )

            And who would the "proper authority" be in this case? His management doesn't care.

            That would be the point. There isn't a "proper authority" because the company isn't doing anything illegal. If, on the other hand, the company is doing something illegal, surely the "proper authority" would be fairly clear? I'm not sure why everyone seems to be defending this guy and jumping on the "whistleblower" bandwagon. How can you expect to post sensitive security details about your company to an internet forum and not lose your job? Regardless of how dumb the company is, this employee isn't the

        • by TubeSteak ( 669689 ) on Tuesday May 27, 2008 @05:33PM (#23563397) Journal

          The whistleblower protection laws in the USA protect an employee from termination for reporting the employer acting illegally.
          Yea and construction workers can legally refuse to work on an unsafe site.
          Neither set of laws will keep you from getting fired for coming back from lunch 3 minutes late.

          If your company wants a reason to fire you, unless you're perfect, they'll find one.
        • Re: (Score:3, Insightful)

          by drinkypoo ( 153816 )

          Shoddy security may be stupid but I don't know if it's illegal or not.

          It probably is illegal, because it's probably fraudulent, not least if you make any kind of claims to being at all concerned about security and then knowingly put into place bad policies like allowing blank passwords. I mean, even if you're a total idiot you can see how that's a bad thing. You've got a secret club, right? And someone comes up and your bouncer says "what's da passwoid?" and he says nothing, and the bouncer says "okay come in den". I mean that makes no sense to anyone, right? So blank passw

          • by Anonymous Brave Guy ( 457657 ) on Tuesday May 27, 2008 @07:03PM (#23564557)

            I think you've pretty much got to the root of the problem there: if this behaviour isn't criminally negligent, it should be. In a world where identity theft is one of the fastest growing (and most damaging) crimes in town, dealing with a business that has previously shown itself to be incompetent in handling personal data and is actively avoiding improving the situation, it's time to start throwing the directors in jail.

            • Re: (Score:3, Insightful)

              by Xiaran ( 836924 )
              SO where are the Credit Card companies in all this. Surely their ass in on the line for fraudulent use of leaked CC information. I would think VISA and Mastercard could step in and insist that this company clean up its security or else disallow payments originating from them.
        • by Pepebuho ( 167300 ) on Tuesday May 27, 2008 @07:29PM (#23564787)
          I am not a lawyer, but I think there might be some way to tie Sarbanes-Oaxley into this.
          As a Public Company, TJX is subject to Sarbanes Oaxley.

          Section 302 demands the certification of Internal Control on Financial data. With such shoddy password system I fail to see how they can comply with it.
          Section 404 demands management to assess risk and solve it
          Section 802 accrues criminal penalties for violations to Sarbanes Oaxley and (TADAM!!!)
          Section 1107 accrues criminal penalties for retaliations against whistleblowers.

          I think this guy should get hold of Section 1107 and run it for all it is worth!!!!

          From Wikipedia:
          http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act [wikipedia.org]

          Section 1107 of the SOX 18 U.S.C. 1513(e) states:[23]

          " Whoever knowingly, with the intent to retaliate, takes any action harmful to any person, including interference with the lawful employment or livelihood of any person, for providing to a law enforcement officer any truthful information relating to the commission or possible commission of any federal offence, shall be fined under this title, imprisoned not more than 10 years, or both.
          I am not sure if posting to a blog could be construed as "providing to a law enforcement officer any truthful information bla bla bla", but I think this is his best shot.

          My 2 cents
      • Re: (Score:3, Informative)

        by zerocool^ ( 112121 )
        http://en.wikipedia.org/wiki/PCI_DSS [wikipedia.org]

        Ask me how I know... ClamAV and I have become more familiar than I ever thought possible.
    • Re: (Score:3, Informative)

      by cyphercell ( 843398 )
      Here's where the company gets in trouble:

      https://www.pcisecuritystandards.org/tech/ [pcisecuritystandards.org]

      which is funny, I used to work upgrading old credit card systems for the pci dss, the scuttlebut at the time was that TJX was the REASON for implementing the DSS in the first place. TJX ought to have the Credit Co.s run a train on 'em for this shit.

  • by vertinox ( 846076 ) on Tuesday May 27, 2008 @04:00PM (#23562135)
    Who is TJX and how can I avoid doing business with them, but then I realized they were TJ Maxx and Marshall's and I don't do business with them anyways.
  • by PacketScan ( 797299 ) on Tuesday May 27, 2008 @04:01PM (#23562139)
    Sadly this is business as a whole. They would rather spend a little after the fact to defend rather than spend just a few dollars to beef up security before a problem occurs. Management is completely inept most times when it comes to security concerns.
    • Re: (Score:3, Interesting)

      by Anonymous Coward
      If the cost of implementing security is greater than the estimated cost of lawsuits due to bad security, a company will not spend the money for better security. This is the same logic the blood banks used for AIDS testing of their blood (until the rhs eventually was greater than the lhs) and this is the same logic that automakers use for defects.
    • Re: (Score:3, Insightful)

      by BSAtHome ( 455370 )
      Everything that is The Right Thing(TM) is tech talk and is normally not understood by management. Techs and management speak different languages which often cause them to work against each other. This is sad but true and this story is another example. Management sees the cost in monetary terms (often short term), whereas the tech sees the cost in a much broader sense (often long term). The inherent conflict can be solved, or at least minimized, if you can find an intermediate who can translate between the l
      • by Anonymous Coward on Tuesday May 27, 2008 @04:28PM (#23562589)
        What security people don't understand is that good security can be very, very, VERY expensive. Far more expensive than some simple PR. I'm not just talking about the up-front cost of doing security right in the first place, but the less noticeable costs of user training, user re-training, tech support, lost productivity (senior manager forgot his admin password), and the cost of letting people go who are very valuable and good at their jobs but too stupid to follow the proper security protocols.

        Good managers understand this and realize that spending that much money on protecting something that's really not very important to the company (customer identities) is just not good business. Until people start hearing on the nightly news that "TJMaxx gave your credit information to terrorists who used it to buy nuclear weapons and assassinate Jesus," the negative publicity they'll suffer is negligible.
        • Re: (Score:3, Insightful)

          by eric76 ( 679787 )
          I suspect that the most expensive of all is trying to teach the president of a company that running open wireless routers is a very serious security problem.

          It might be easier to convince an alligator to voluntarily become a vegetarian.
        • by AB3A ( 192265 ) on Tuesday May 27, 2008 @04:48PM (#23562827) Homepage Journal
          Very expensive? Compared to what? Going out of business?

          What if your bank decided that those pesky safe deposit boxes would be a whole lot cheaper if only they could use unlocked filing cabinets instead. Would you still want to do business with them?

          The sad state of affairs here is that the problem doesn't become apparent until someone gets hacked.

          I think a firm that has a security breech ought to be forced to make restitution to the customers. Managers may not understand security, but they will understand lawsuits and damages.

          Only once you've rubbed a manager's nose in the problem can you expect a solution. We don't HAVE to address everything, but managers should at least be aware of the risks they're taking.

          It's a telling point that they've chosen to persecute instead of promote the person who exposed the flaws. These idiots would rather hide in the corner than address the risks up front.
        • by moderatorrater ( 1095745 ) on Tuesday May 27, 2008 @05:38PM (#23563459)
          This has been a struggle for centuries.

          Engineer: "I don't care what you read in 'Feudal Lords Monthly', if you want this castle to be secure, we need 2000 foot tall walls, 700 feet thick with a moat of pure acid that's 200 feet deep."
          Lord: "But I read that this spell of invisibility and Norton(tm) balsa wood framework is just as good. It leads the industry!"
        • Re: (Score:3, Insightful)

          It doesn't have to get as far as terrorists and nukes if the Credit Card companies would enforce the penalties for non-compliance to the PCI Standard. I know that the credit card processing agreement that my s.o. business has indicates that if your firm is "leaking" card numbers due to inadequate security they can penalize UP TO the removal of your firm priveleges to accept credit cards. Seeing as how many retail stores get 50%+ of their sales from Credit Cards or branded debit cards that would be a big hur
        • by Tom ( 822 ) on Wednesday May 28, 2008 @01:03AM (#23567215) Homepage Journal

          What security people don't understand is that good security can be very, very, VERY expensive.
          Maybe. But the point here wasn't about good security it was about minimum security.

          Good security can be expensive. But adequate security is fairly cheap. "password == username" and "blank password" are essentially equal to "no password". Having any password at all, even if it's weak from the POV of a security expert (say, a word from the dictionary) is still a whole lot better than having no password. And it's not very expensive. A billion people in millions of companies manage to remember their login password from monday through friday, and sometimes even over the weekend. I'm sure with just a little training, TJX managers would be able to do that, too.
    • Re: (Score:3, Insightful)

      by Thelasko ( 1196535 )

      Sadly this is business as a whole. They would rather spend a little after the fact to defend rather than spend just a few dollars to beef up security before a problem occurs. Management is completely inept most times when it comes to security concerns.

      Not just security concerns, but any issue. Since their inception, companies have developed policies of less customer service, less security, and an overall goal to screw over the customer. The internet is a means to cure all of those issues because if provides the medium for consumers to organize and retaliate against this tyranny. Unfortunately, instead of improving the overall performance of the company, management chooses to troll forums in attempts to suppress any unfavorable comments about them.

      C

    • by qoncept ( 599709 )
      Really? It's been my experience that companies go out of their way to ensure nothing like this ever gets out. Requiring better passwords means they need to hire a few more guys to man the help desk. Bad press hurts more than that.

      Not that they are overly effective. Also, in my experience, "going out of their way" consists of choosing random -- rather than the most effective -- methods to secure networks and data.
  • ah well (Score:3, Interesting)

    by pak9rabid ( 1011935 ) on Tuesday May 27, 2008 @04:01PM (#23562141)
    Sounds like they were a shitty company anyways. I'm sure he'll be better off w/another company.
    • by Anpheus ( 908711 )
      I'm sure he'll be better off w/o his pay too.
      • I'm sure he'll be better off w/o his pay too.
        I'm sure he won't have a problem finding a new, better job. Most people that know their shit (which it sounds like he does) don't stay unemployed for too long, unless they want to be.
      • by ivan256 ( 17499 )
        Massachusetts (where TJX is located) has a generous unemployment benefit, which continues to pay you even you move out of state to find another job. Additionally, the job market in the area for good IT workers is strong. He should have no trouble finding better employment if he's good at his job.

        There is only a problem here if TJX isn't punished for mis-appropriating the trust of their customers, and for attempting to cover-up their misdeeds.
      • Re:ah well (Score:4, Funny)

        by ivan256 ( 17499 ) on Tuesday May 27, 2008 @04:14PM (#23562359)
        Wait... He was an hourly associate in one of their retail outlets?

        McDonalds is always hiring. It'll be a step up for him.
  • One store (Score:4, Informative)

    by Anonymous Coward on Tuesday May 27, 2008 @04:01PM (#23562143)
    This was a server at one store, not the TJX headquarters where the data is kept.
    • Re:One store (Score:5, Informative)

      by Anonymous Coward on Tuesday May 27, 2008 @04:35PM (#23562659)
      "This was a server at one store, not the TJX headquarters where the data is kept"

      The original loss of data was caused by weak passwords on wireless routers. War dialers parked outside a store (or stores) captured data that was then used to collect millions of credit card numbers from the HQ servers. One of the problems was that TJX kept CC numbers on file long after they had any use for the information. This is a case where bad security at one store compromised the whole corporation. Sounds like nothing has changed
      • Re:One store (Score:5, Informative)

        by darkmeridian ( 119044 ) <<moc.liamg> <ta> <gnauhc.mailliw>> on Tuesday May 27, 2008 @05:30PM (#23563359) Homepage
        The war dialers logged into TJX HQ servers and were able to install applications that sniffed network traffic and logged passwords. TJX not only kept CC numbers long after they had any use for the information, they also kept transactional CC data that was not supposed to be kept after a transaction was done.
        • Re:One store (Score:4, Insightful)

          by jamstar7 ( 694492 ) on Tuesday May 27, 2008 @06:59PM (#23564513)

          TJX not only kept CC numbers long after they had any use for the information, they also kept transactional CC data that was not supposed to be kept after a transaction was done.

          Um, isn't this what the US government wants done with the new regulations? As well as sharing this info with the gov, of course...

    • Re: (Score:2, Interesting)

      by Anonymous Coward
      Yes, but IF I remember correctly the original breach occurred because of both physical and logical security control deficiencies at individual stores. This directly lead to the compromise of systems at the headquarters, and, ultimately, customer information.

      As a full-time security professional and penetration tester that deals with companies in this situation everyday I can almost guarantee you that given their history and apparent mind-set towards security, almost anyone at a "script kiddie" level would b
    • Although that is certainly true, do you know that this is not true for all stores and maybe even the data center?

      Also, why should we not think that you are an agent of that firm that scours the internet to find bad things posted about TJX, hired by them, Mister A.C.?!

      Also interesting titbit from TFA:

      "Not one single thing was done. My store manager even posted the password and username on a post-it note. I told her not to do that."
  • by Anonymous Coward on Tuesday May 27, 2008 @04:02PM (#23562159)
    I used the same password as this account, and obviously some people found out about it and have been posting under my username for ages! :(
  • by elrous0 ( 869638 ) * on Tuesday May 27, 2008 @04:05PM (#23562197)
    Seriously, what did he expect, that a lazy corporation was going to reform its security policies because a 23-year-old hourly employee complained anonymously on a blog? And what did he think they were going to do when they caught him, give him a raise and a promise to change their cheap lazy ways?
    • Hey, yeah, what was this guy thinking, doing the right thing in spite of the risks? He deserved to get screwed over, right? Everyone just play along, don't rock the boat, do what you're told, and shut the hell up. Thanks so much for sharing your sage wisdom and mature outlook.

      Maybe he expected exactly what happened and blew the whistle anyway. So, wise elder, what would you have done?
      • by elrous0 ( 869638 ) * on Tuesday May 27, 2008 @04:17PM (#23562407)
        Being a whistleblower means sacrifice. No one gives you a medal for doing the right thing, nor should you expect anything but scorn.
        • by compro01 ( 777531 ) on Tuesday May 27, 2008 @04:21PM (#23562467)
          Yes, things currently work that way. Things shouldn't work that way.
          • But things always have worked that way, and, most likely, always will work that way. It's just how life is, sadly.
          • Re: (Score:3, Insightful)

            by Kingrames ( 858416 )
            What is right is almost never easy.
            If it were it wouldn't be something worth mentioning.
        • Assuming this is how things actually are, what makes you think this kid expected anything different? Where do you see him begging for a medal?

          But it really sounds like you are going further, saying that not only is this how things are, but how they ought to be. It really sounds like you are coming down on the guy for doing the right thing.

          Or maybe you are trying to say that everyone should be as cynical as you are? Maybe you believe that we should all expect to get fucked over for doing the right thing, and anyone who doesn't expect that is an idiot who deserves what they got.

          Please clarify, do you think this guy got the treatment he deserves? Should we not be outraged here? I'm confused as to your motives for posting what you originally did.
        • Re: (Score:3, Insightful)

          by evilviper ( 135110 )

          No one gives you a medal for doing the right thing,

          So tell me, what DO they give you medals for?
    • Re: (Score:3, Informative)

      by dgatwood ( 11270 )

      Remember, kids, like TSA Panda says, the appearance of security is more important than actual security.

      BTW, Sarbanes-Oxley has whistleblower protection that may get this company in deep, deep s**t for firing this blogger....

    • by pla ( 258480 ) on Tuesday May 27, 2008 @05:01PM (#23563013) Journal
      Seriously, what did he expect, that a lazy corporation was going to reform its security policies because a 23-year-old hourly employee complained anonymously on a blog?

      If they had any integrity - Yes, that sounds like the best possible outcome of this.

      Think about it - The CIO didn't say "okay, after a major data breach, go ahead and keep using pathetic passwords". The order came down from On High to use secure passwords. This proved inconvenient to hundreds of piddling middle-managers, who ordered "their" IT guys to find a way around all that nasty security. The local IT guys complied, by allowing blank passwords (Corporate probably never expected anything that stupid, and so didn't have a policy stating otherwise).

      So, sometime later, Corporate discovers what has happened, and it enrages them. They meet, discuss, take aim, and fire...

      ...At their own foot.


      And what did he think they were going to do when they caught him, give him a raise and a promise to change their cheap lazy ways?

      They could have addressed the problem and rewarded the child who dared to laugh at the naked emperor. By chosing not to, they have very effectively told me they care more about appearances than the security of my credit card data. As a result, I will no longer shop there.
      • Re: (Score:3, Interesting)

        >>And what did he think they were going to do when they caught him, give him a raise and a promise to change their cheap lazy ways?

        >They could have addressed the problem and rewarded the child who dared to laugh at the naked emperor.

        Punishing employees who let you know about problems is like disconnecting your smoke detector. Some of the big security policy frameworks call for a policy statement that *requires* reporting of security problems. If TJX had been my client, they would have been advised
  • by ee_smajors ( 1157317 ) on Tuesday May 27, 2008 @04:06PM (#23562233)
    This guy should be promoted to CIO for the company and given carte blanc to clean house on the asshole who did not deal with the original issue. Until I hear that this guy is justly treated, we will not ever spend another penny in TJX stores. Enough of us and the CEO will be looking for a new job.
    • Re: (Score:3, Informative)

      by Kingrames ( 858416 )
      The problem being that everyone under him will be suffering far more, for far longer, because of a protest like that.
  • by SlshSuxs ( 1089647 ) on Tuesday May 27, 2008 @04:08PM (#23562265)
    This data is implicitly safe now by the weak American Dollar, it would be like stealing Pesos.
  • Good for him (Score:3, Insightful)

    by sleekware ( 1109351 ) on Tuesday May 27, 2008 @04:10PM (#23562295)
    I don't blame him at all. There is far too much incompetence out there regarding data security. I am lucky to work for a company that listens, but I have quite a few friends who work for companies that don't seem to give a damn. It's a shame.
    • This is the same problem I run into at my company. I try to implement secure logins, and executives/management complain about having to enter passwords. I try to keep the PCs from being used by non-authorized personnel, and people complain about having to "relogin every five minutes" even though the passworded screensaver only kicks in after an hour. It's impossible to have any semblance of sane security when management complaints trumps IT's policies. This despite the fact that we deal with customers' pers
  • by Anonymous Coward on Tuesday May 27, 2008 @04:11PM (#23562307)
    Here's the TJX web site [tjx.com] [warning: Flash], where you'll learn that they are TJMaxx, Winners, Marshalls, HomeSense, HomeGoods, TKMaxx, AJWright, and Bob's Stores. You can also read a nice letter from the TJX president and CEO [tjx.com] describing how they have "...worked diligently with some of the world's best computer security firms to further enhance our computer security."

    Blank passwords. Wow. No bad guys would ever try that. Disclosing that policy would really compromise security, wouldn't it?

  • Dear TJX (Score:5, Funny)

    by Archangel Michael ( 180766 ) on Tuesday May 27, 2008 @04:11PM (#23562317) Journal
    Dear TJX,

    We're the Slashdot community, and would like you to meet Ms Barbara Streisand, who can help you with your media relations problem.

    Yours Truly,

    Slashdot Community.
  • If we don't talk about it, it'll go away. Shhh.
    No security problem, not here. huh huh.
  • I think it is time you hired a more competent CIO, who makes it a priority to EXECUTE on security issues.
  • "I would assume your disclosure of your company's inner server workings on the internet means that they can't trust employees to protect their information?"
    ...
    Benson's disclosures weren't specific enough to give attackers information needed to successfully breach TJX's networks.

    If you want to openly reveal insider company information without first seeking appropriate approval you should expect to be fired.

    On top of that I'm a bit suspicious to how privy the kid was to information above and beyond the i

  • Since when? (Score:4, Interesting)

    by MrNougat ( 927651 ) <ckratsch@ g m a i l . com> on Tuesday May 27, 2008 @04:36PM (#23562661)
    Since when is "allowing blank passwords" a compromise, and not stupid?
    • by Renraku ( 518261 )
      *whine* But we have to remember a passsworddddd. We just want to hit login and have everything magically work!
  • I see certain managers sending embarrassing emails to the entire office. ;)

  • by mrkitty ( 584915 ) on Tuesday May 27, 2008 @06:00PM (#23563791) Homepage
  • Gold Mine (Score:4, Funny)

    by Nom du Keyboard ( 633989 ) on Tuesday May 27, 2008 @06:12PM (#23563953)

    In spite of the weak internal security, TJX now has a firm that scours the internet to find bad things posted about them, which is how they found the message and fired him for it.

    Then they've found a Gold Mine here on Slashdot.

  • by LostCluster ( 625375 ) * on Tuesday May 27, 2008 @10:17PM (#23566199)
    TJX just doesn't get it. They hired a team to look for insider negative postings, and considered that an increase in security. They consider the negative poster a rouge insider... but they can't seem to track down who was at fault for the massive breach that they suffered from. That's the person we really want fired.

    What we, the people who used to shop at TJ Maxx, Marshalls, AJ Wright, HomeGoods, and Bob's Stores, are looking to see is that they can finally claim that they increased their security (using the same standards we expect on the web) so that nobody can intercept what we show the cashier, our credit card stripe data and signature, on its way to the credit card processing company they're using. Good encryption is freely available, great would be hearing that they hired a company that cares about it.

    They're thinking about what directly impacts the bottom line (profits) while forgetting that what upsets the customers will directly impact the top line (sales) that will impact that bottom line too.
  • by museumpeace ( 735109 ) on Tuesday May 27, 2008 @11:09PM (#23566583) Journal
    http://www.tjx.com/employment/life_brands.html [tjx.com] I don't know who paid for it but I have had new credit cards issued not because I asked for them...kinda messed up my cookies for on line purchases. These guys suck.
  • Forexample:
    BIG_b00bs_a how hard is that to remember?
    another
    P4ssw0rd5_suck_m3_0ff

    Another:
    ROY_G_B1V_aa

    Jeez, there really isn't any excuse. I think they called this PAL in the Military.
    How about the first few letters from the first words in a song or poem?
    from Mary had a little lamb:
    Mhallwfwwas&wmw12

    or another
    IXdKKaspdd_10

    This can't remember password BS really annoys me.
    Add to the fact that any computer system to day should lock down the computer after3 attempts..ah hell lets make it 5 attempts should prevent a brute force or dictionary attack from happens so changing your password isn't really that necessary any more, it's a hold out from 25 years ago when you could only have 8 characters, and there wasn't any lockout.
    Since most people who implement security do not understand security and could do risk analysis if their life depended on it, I'm not surprised at the state of affairs in computer security.

    And before someone who thinks they know what they are doing corrects me, yes, I do know there are some systems that need tighter security, like missile Codes. Having handled them I know a thing or 4 about them. I am talking about security for 99.99% of everyone else.

No spitting on the Bus! Thank you, The Mgt.

Working...