Forever 21 breach exposed customer credit card info for months

If you shopped at a Forever 21 store this year, there’s a chance your credit card information may have been stolen, CNET reports. The retail store confirmed this week that between April 3rd and November 18th of this year, a number of point of sale terminals at stores across the US were breached. While it hasn’t provided any numbers on how many customers were affected, Forever 21 did say that in most cases, card numbers, expiration dates and verification codes, but not cardholder names, were obtained by hackers. However, in some cases names were also obtained. Encryption is usually used by the store to protect its payment processing system, but in some stores, the encryption was sometimes off, opening up their point of sale terminals to malware. Not every terminal in every affected store was infected with the malware and not every store was impacted during the full time period of the breach. In some cases, credit card data stored in certain system logs prior to April 3rd were also exposed. Forever 21 said payment processing systems outside of the US work differently but that it was investigating whether non-US stores were affected as well. Purchases made through its website weren’t impacted by the breach. Chipotle and GameStop suffered similar breaches this year while hotel giant HEI announced it was hit with the same type of data breach last year . In a statement , Forever 21 said, “In addition to addressing encryption, Forever 21 is continuing to work with security firms to enhance its security measures. We also continue to work with the payment card networks so that the banks that issue payment cards can be made aware of this incident. Lastly, we will continue to support law enforcement’s investigation of this incident.” Via: CNET Source: Forever 21

Read More:
Forever 21 breach exposed customer credit card info for months

Asus ROG GX800VH review: A ludicrous liquid-cooled $6,000-plus laptop

Enlarge (credit: Mark Walton) The Asus ROG GX800VH, a liquid cooled monstrosity of a gaming laptop, is one of those things that, like 4K phones or the Apple Watch , is wholly unnecessary yet awfully desirable. Beneath its fully mechanical, RBG-lit keyboard is Intel’s top-of-the-line mobile i7-7820HK processor, which is based on the same Kaby Lake architecture as the  i7-7700K  and is similarly overclockable. There are two Nvidia GeForce GTX 1080 graphics cards paired in SLI, 64GB of DDR4 memory, and an 18.4-inch 4K display with G-Sync. Buying one costs £6,600 /$6,300, which is an astonishing amount of money even considering the tech that’s included. Specs at a glance: Asus ROG GX800VH Screen 3840×2160 18.4-inch IPS G-Sync display 100 percent RGB OS Windows 10 Home x64 CPU 4C/8T 2.9GHz Core i7-7820HK (OC to 4.4GHz) RAM 64GB 2800MHz DDR4 GPU 2x Nvidia GTX 1080 HDD 2x 512GB NVMe SSD in RAID 0 Networking 802.11ac WiFi, Bluetooth 4.1, Gigabit Ethernet Ports 1 x Microphone-in jack 1 x Headphone-out jack (SPDIF) 1 x Type C USB3.1 (GEN2) Thunderbolt 3 x Type A USB3.0 (USB3.1 GEN1) 1 x RJ45 LAN Jack for LAN insert 1 x HDMI 1 x Docking port (HOT swap) 1 x mini Display Port 1 x SD card reader Size Laptop: 45.8 x 33.8 x 4.54 cm (WxDxH) Dock: (Thermal Dock) 35.9 x 41.8 x 13.3 cm (WxDxH) Other perks 8 Cells 71 Whrs Battery, HD Web Camera, Mechanical Keyboard Warranty 1 year Price £6,600 /$6,300 The GX800VH certainly isn’t for everyone, then, not least those that want the most bang-for-the-buck. But as an example of what’s possible on the bleeding edge when money is no object, it’s one of the finest pieces of technological willy-waving that we’ve ever seen. Buying a GX800VH requires a commitment from both your credit card and your ego. Not only is the laptop itself physically large and covered in orange highlights, but it comes with both a backpack and a suitcase to carry the accompanying liquid cooling unit around—and the graphics on the suitcase are hardly what you’d call subtle. Still, the suitcase—which is filled a pre-cut foam insert for the liquid cooling unit and extra power supply—and bag do make carrying the whole setup around that much easier, should you want to lug it around to a friend’s house or, if you’re seriously committed to gaming, on holiday. Read 15 remaining paragraphs | Comments

Read more here:
Asus ROG GX800VH review: A ludicrous liquid-cooled $6,000-plus laptop

Chipotle finds malware exposed credit card info across the US

Hackers stole credit card information from customers at Chipotle restaurants across the United States between March 24th and April 18th, the company announced today. Chipotle revealed in April that it had been the victim of an attack, and today it shared details about the type of information stolen from customers, which covered “cardholder name in addition to card number, expiration date, and internal verification code.” No other information was compromised, Chipotle said. The attack pulled data off the magnetic strips of credit cards used in physical Chipotle locations around the US. The company has not said how many customers were affected, though it offered a searchable list of locations that were actually hit in the attack, including the dates each restaurant was vulnerable. Some were compromised for about a week, and others for the full four weeks. If you swiped a credit card at a Chipotle in March or April, check out the list of affected restaurants right here . “Because of the nature of the incident and the type of data involved, we do not know how many unique payment cards may have been involved, ” Chipotle spokesperson Chris Arnold told Engadget. As Reuters notes, Chipotle is not offering credit monitoring services to compromised customers. The company said monitoring services don’t alert customers when a fraudulent charge is made in their name. “Chipotle takes this kind of issue very seriously, and we regret any inconvenience or concern it may have caused, ” Arnold told Engadget. “To help prevent a similar incident from recurring, we have resolved the issue and continue to work with cyber security firms to evaluate ways to enhance our security measures.” Source: Chipotle

View original post here:
Chipotle finds malware exposed credit card info across the US

HipChat resets all passwords after hackers break in

Today, Hipchat alerted its users that someone broke into one of its servers through a vulnerability in a third-party library. The chat service saw no evidence that other Atlassian systems or products like Jira or Trello were affected, but they’re forcing every user to reset their HipChat-connected account password as a precaution. According to the service’s blog post , the attacker might have gotten access to user information (including name, email and hashed password) of anyone using HipChat.com. There’s been no sign that over 99 percent of users’ messages or room content was compromised, though the attacker could have accessed that portion’s metadata. A small fraction (.05 percent) of instances might have been wide open to the hacker, who would have been able to see correspondence and content. Fortunately, no evidence has suggested that the attacker has accessed anyone’s financial or credit card information. “While HipChat Server uses the same third-party library, it is typically deployed in a way that minimizes the risk of this type of attack, ” the blog post said, but the service will roll a security update out for Hipchat Server just to be sure. Source: HipChat

View article:
HipChat resets all passwords after hackers break in

Holiday Inn Cops to Massive Credit Card Data Breach

It seems like every day there’s news of another significant data breach, so here’s today’s: An internal investigation by the InterContinental Hotel Group, which owns Holiday Inn, has revealed that guests at more than a thousand of their hotels had their credit card details stolen. The company identified malware on… Read more…

See more here:
Holiday Inn Cops to Massive Credit Card Data Breach

IBM built an atomic hard drive

While the rush to keep pace with Moore’s Law is getting rather “chaotic” , researchers at IBM announced on Wednesday that they have drastically reduced the space required to store a bit of information down to that of a single atom. This tiny advancement in storage technology, is a big deal. Given that modern hard drives need about 100, 000 atoms to store a single bit, this development could shrink the size of future storage mediums by an order of magnitude. IBM figures that it can store the entire iTunes catalog (all 35 million tracks) onto a disk the size of a credit card by using this technique. A single atom of holmium credit: IBM Research – Almaden The system uses atoms of holmium seated atop a magnesium oxide surface, which keeps the atom’s magnetic poles stable — even in the presence of other magnets. The orientation of these poles determines whether the atom constitutes a 1 or a 0. To write to this storage system, a microscopic needle induces a current to flip the atom’s orientation. Reading the information, conversely, is simply a matter of measuring the magnetic current passing through each atom, which varies depending on which pole is facing up. But don’t expect this technology to show up in the next iPhone, mind you. It currently requires a liquid nitrogen-cooled tunnelling electron microscope operating in a vacuum to work. The study was published today in the journal Nature .

View the original here:
IBM built an atomic hard drive

Hackers Corrupt Data For Cloud-Based Medical Marijuana System

Long-time Slashdot reader t0qer writes: I’m the IT director at a medical marijuana dispensary. Last week the point of sales system we were using was hacked… What scares me about this breach is, I have about 30, 000 patients in my database alone. If this company has 1, 000 more customers like me, even half of that is still 15 million people on a list of people that “Smoke pot”… ” No patient, consumer, or client data was ever extracted or viewed, ” the company’s data directory has said. “The forensic analysis proves that. The data was encrypted — so it couldn’t have been viewed — and it was never extracted, so nobody has it and could attempt decryption.” They’re saying it was a “targeted” attack meant to corrupt the data rather than retrieve it, and they’re “reconstructing historical data” from backups, though their web site adds that their backup sites were also targeted. “In response to this attack, all client sites have been migrated to a new, more secure environment, ” the company’s CEO announced on YouTube Saturday, adding that “Keeping our client’s data secure has always been our top priority.” Last week one industry publication had reported that the outage “has sent 1, 000 marijuana retailers in 23 states scrambling to handle everything from sales and inventory management to regulatory compliance issues.” Read more of this story at Slashdot.

Read the original:
Hackers Corrupt Data For Cloud-Based Medical Marijuana System

FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant

Joseph Cox, reporting for Motherboard: In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually several orders of magnitude larger. In all, the FBI obtained over 8, 000 IP addresses, and hacked computers in 120 different countries, according to a transcript from a recent evidentiary hearing in a related case. The figures illustrate the largest ever known law enforcement hacking campaign to date, and starkly demonstrate what the future of policing crime on the dark web may look like. This news comes as the US is preparing to usher in changes that would allow magistrate judges to authorize the mass hacking of computers, wherever in the world they may be located. Read more of this story at Slashdot.

Read More:
FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant

Thieves find an even more insidious way to swipe your PIN

The secret service has issued a warning to banks and ATM companies about a new way that thieves can steal your credit card information . A report from Krebs on Security explains that “periscope” skimmers have been found inside teller machines in Connecticut and Pennsylvania in the last two months. Of course, since the devices attach to the internal mechanism, there’s absolutely no way for an end user to tell if they’re at risk. The report explains that ATMs with openable lids are the most at risk, since nefarious types can easily gain access inside. The “periscope” probe is installed in a pre-existing hole in the card reader to skim the magnetic stripe, while the other end contains a battery and storage unit. It’s believed that the device can store up to 32, 000 numbers and will last 14 days on a charge. What the gear can’t do, however, is harvest PINs, so it’s theorized that these devices were tests in preparation for a bigger heist. Krebs goes on to add that putting your hand over the cash dispenser’s number pad will defeat a large proportion of scammers with skimmers. Thieves who use pin-pad overlays — fake buttons over the real thing — are relatively rare because the hardware is expensive to reproduce. Krebs also advises users to avoid, wherever possible, standalone ATMs where the lid is easily accessible. Instead, people should favor cashpoints that are mounted in the wall, like those outside banks, and in well-lit areas. Source: Krebs on Security

More:
Thieves find an even more insidious way to swipe your PIN

This Is Why Your Credit Card Transactions Take So Long to Clear

When you swipe a credit or debit card at the store, your done with the transaction instantly. So why can’t your account statement keep up? If you’ve wondered why it takes so long for purchases to show up on your credit card statement or withdraw from a bank, it’s because of a long, complicated process behind the scenes. Read more…

View original post here:
This Is Why Your Credit Card Transactions Take So Long to Clear