Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Retailer Supervalu investigates data breach

by The Gurus
August 15, 2014
in Editor's News
Share on FacebookShare on Twitter

American retailer Supervalu has said it has no evidence of any misuse of customer data, as it said it was investigating a potential data breach.
 
According to Reuters, Supervalu CEO Sam Duncan said in a statement: “I regret any inconvenience that this may cause our customers, but want to assure them that it is safe to shop in our stores.”
 
It suspected that the intrusion may have resulted in the theft of account numbers and other numerical information from payment cards used at some point-of-sale systems at the company’s owned and franchised stores. The data breach appears to have taken place during the period between June 22nd and July 17th, the retailer said.
 
“The intrusion was identified by our internal team, it was quickly contained”, Duncan said. Supervalu said that the intrusion may have resulted in the theft of account numbers and in some cases, also the expiration date, other numerical information and/or the cardholder’s name, from payment cards used at some point of sale systems at some of the Company’s owned and franchised stores.
 
According to NASDAQ, Minneapolis-based Supervalu, which has 3,320 stores in all, hasn’t notified customers about the potential incident, as merchants often do not alert customers about breaches until they know the scope of the attack.
 
The intrusion may also have resulted in the theft of such cardholder data from some cards used during this period at 29 franchised Cub Foods stores and stand-alone liquor stores, which are included in the store list referenced on the Supervalu website.
 
Mark Bower, VP at Voltage Security, said: “By now, every retailer is aware of the risks of malware in the POS, the impact, and the simple fact being compliant to PCI doesn’t equate to mitigating advanced threats that no doubt again stole the gold in this case.
 
“The only way to neutralise this risk is to avoid any sensitive data passing in and through the vulnerable POS or retail IT. Hundreds of thousands of merchants already do this today with proven approaches using the latest innovations in data-centric security and are able to brush off such attacks like water off a ducks back. These risks are totally avoidable – and at a fraction of the cost of the fallout from dealing with the consequences.”
 
Earlier this week, it was revealed that the Target breach will cost the retailer $148 million in expenses related to the breach, of which $38 million will be recovered via an insurance payout.
 
George Anderson, Director at Webroot, welcomed the way that SuperValu had handled the incident, after numerous companies experienced harsh criticism for covering up breaches and not being transparent with customers, leaving them vulnerable to phishing attacks.
 
“SuperValu on the other hand, is a brilliant example of how a breach should be managed – openly providing information, informing customers, opening the investigation and offering free identity management service for those who could have been affected by the breach,” he said.
 
“Such actions show that the company has the right attitude to cyber security – accepting the fact that a cyber-attack is a matter of time, rather than a possibili
ty and ensuring the right mitigation plans are put in place should the worse happen.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Fake Tor website offers up malicious payload

Next Post

Currency thief hijacked traffic to earn £83,000 in profits

Recent News

security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information