The breach at Target Corp. that compromised as many as 40 million payment card accounts, along with the personal information of about 70 million customers, was the result of hackers stealing electronic credentials from a vendor, the retailer reports.
The hacktivist group European Cyber Army on Jan. 28 said it waged DDoS attacks against Bank of America and JPMorgan Chase. DDoS-tracking sources say the botnet involved is the same one used for 2012-2013 attacks against U.S. banks.
While details surrounding a suspected breach at Michaels remain unclear, two U.S. card issuers say they believe the retailer was targeted by point-of-sale malware similar to what compromised Target and Neiman Marcus.
Representatives of the American Bankers Association, the National Retail Federation and the PCI Security Standards Council are among those slated to testify at a Feb. 3 Senate hearing on safeguarding consumers' financial data.
Arts and crafts retailer Michaels is looking into a possible data breach that may have led to fraudulent activity on U.S. payment cards. But experts disagree about whether there's a connection to the Target and Neiman Marcus attacks.
The takedown of a counterfeit payment card website was enabled by collaboration between the FBI and the United States Postal Inspection Service. Learn why experts say more of this kind of dual-agency work is needed.