Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Hackers Grab 1.5 Million Visa, MasterCard Numbers
Hackers Grab 1.5 Million Visa, MasterCard Numbers

By Jennifer LeClaire
April 2, 2012 10:55AM

Bookmark and Share
"Unfortunately, traditional tools such as firewalls, antivirus and [intrusion detection and prevention systems] are no longer enough to protect against rapidly evolving zero-day and insider attacks," said security executive Mike Potts of the security breach at Global Payments of Visa and MasterCard data. "Companies must instead seek out next-generation solutions" to protect against data breaches like the one at Global Payments.
 



It's no longer just a possibility. Visa and MasterCard are the latest victims of a security breach. Global Payments, an international credit card processor, on Sunday confirmed that hackers had stolen credit card numbers of as many as 1.5 million customers.

Whether the problem is careless or malicious insiders or criminal networks looking to monetize their exploits for financial and ideological gain, every organization must be diligent about protecting customer data, Lawrence Reusing, general manager for mobile security at Imation Corp., told us Monday morning.

"Today, companies are investing billions of dollars in the IT security industry's best-of-breed solutions," Reusing said. "Organizations need to layer their information network with technologies that protect the network itself from outside intrusion, the data and proprietary information that resides on it, and the easily lost or stolen mobile devices employees use to access the network and work out of the office."

Remembering Heartland

Neil Roiter, research director at Corero Network Security, also shared some thoughts with us on the topic. As he sees it, this latest breach shows that three years after the Heartland Payment Systems breach of 130 million credit card numbers, credit card data is still vulnerable.

"The Payment Card Industry Data Security Standard (PCI DSS) is highly prescriptive in nature, but simply complying does not ensure credit card security," Roiter said. "Companies that rely on PCI DSS to solely dictate their security measures will continue to remain vulnerable to attack."

We also asked Mike Potts, CEO of Lancope, for his insights into the Visa and MasterCard breach. His conclusion: The perimeter-based approach is not sufficient and fails to protect critical data and internal resources that bypass these point solutions. What's more, he said, enterprises must find new ways to deal with online security issues that are made more complex by IT consumerization, mobility and movement to the cloud.

"Unfortunately, traditional tools such as firewalls, antivirus and [intrusion detection and prevention systems] are no longer enough to protect against rapidly evolving zero-day and insider attacks," Potts said. "Companies must instead seek out next-generation solutions such as flow-based monitoring to obtain the comprehensive network visibility they need to thwart today's more targeted and sophisticated threats."

Browsers to Blame?

Bill Morrow, CEO and executive chairman of Quarri Technologies, told us that the continued adoption of Web applications for secure electronic transactions introduces a weak link in the chain of security.

"Banks, government agencies, healthcare institutions and other organizations are increasingly using browsers as the primary platform for the delivery of information, making browsers the primary point of theft or data leakage," he said. "Standard Web browsers contain critical security gaps that create significant risks to organizations' confidential data." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Jay:

Posted: 2012-04-05 @ 4:41pm PT
In the wake of Global Payments' data breach, there has been a lot of advice on what people should do to protect themselves, but way too often we are asked to do more than what's needed and that can needlessly lead to different issues. However, while the damage done by the hackers is real, they cannot harm us without first tricking us into revealing the information they don't yet have (name, address, SSN). So as long as we are cautious and don't give our personal information to strangers, we will do just fine. For more: http://blog.unibulmerchantservices.com/how-to-respond-to-the-global-payments-data-breach.

Jay:

Posted: 2012-04-04 @ 4:03pm PT
From what we know, the Global Payments hackers may have managed to gain access to Track 2 data, which includes the account number, the card's expiration date and some other pieces of data, but not the cardholder's name, address, SSN and the card security code. So cardholders should now be on a high alert for phishing attacks, which may be employed by the criminals as a way to obtain the missing data. Of course, that depends on the hackers having obtained their victims' email addresses, which we don't know. For more: http://blog.unibulmerchantservices.com/what-criminals-can-do-with-the-stolen-global-payments-data.



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   New Technology Defeats Privacy Efforts
2.   Juniper DDoS for High-IQ Networks
3.   Big DDoS Attacks Hit Record in 2014
4.   Can Google Stop Zero Day Flaws?
5.   U.N.: Nations Hide Digital Snooping


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
New Technology Defeats Privacy Efforts
Study identifies 3 browser techniques.
Average Rating:
Big DDoS Attacks Hit Record in 2014
Attackers often use NTP reflection.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 
Large-Volume DDoS Attacks Hit Record in 2014
The number of distributed denial-of-service (DDoS) attacks set a record in the first half of 2014, according to a report by Arbor Networks. The number of attacks over 20 GB/sec doubled.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.