Search By Topic:

Popular Topics:



News & Features | Dec 20th, 2013

How Hackers Used Malware to Steal 40 Million Credit Card Numbers from Target

Jared Howe

Target hackingYou probably have read the headlines by now: computer hackers stole 40 million credit card numbers from Target customers. That number alone boggles the mind. That’s every single Target customer who used a credit card in a store from Black Friday until earlier this week.

According to KrebsOnSecurity, the stolen credit and debit card accounts "have been flooding underground black markets in recent weeks, selling in batches of one million cards and going for anywhere from $20 to more than $100 per card."

Of course, this is not the first time that a major retailer has had its confidential data compromised. It seems that every time we turn around, we hear about another company whose databases have been hacked.

Sadly, these huge corporate data breaches have become all-too-familiar at this point.

What’s Different About the Target Data Breach

What you may not know is how these online thieves got away with it. They used one of the oldest tricks in the computer hacker’s playbook: malware.

These cyber thieves either convinced a Target employee to click on a malware link or somehow downloaded malware to the Target network that allowed them to track the credit numbers of literally tens of millions of people.

You probably have heard about malware because you’ve done something similar. Either you clicked on a suspicious link or file in an email, visited an untrustworthy website, or installed software that was infected.

If your computer has ever displayed an annoying pop-up ad that won’t go away, or has ever had a virus that slowed it to a crawl, then you have been the victim of malware.

Malware attacks are growing exponentially, and are showing no signs of slowing down. New malware attacks for computers have doubled since 2011, and increased over 44 times for mobile devices in 2012 alone.

Malware is not going away any time soon, so we better learn to protect ourselves.

More About Malware

Malware is short for malicious software. It is software that is designed to disrupt your computer, gather your personal information, and gain unauthorized access to your computer’s files.

Malware includes computer viruses, worms, Trojan horses, spyware, dishonest adware, ransomware, and any other malicious software.

Review this list to learn about programs intended to harm your computer -- and possibly -- steal your confidential information:

  • A computer virus is a program that can replicate itself and spread from one computer to another via a network or the Internet. It may be harmless and do nothing but replicate itself, or it could cause a program to operate incorrectly or corrupt your computer's memory.
  • A Trojan horse is a program which contains malicious or harmful code inside seemingly harmless programs or data so that it can get control and do damage to your computer, such as ruining your hard drive.
  • Spyware is a type of malware which collects small pieces of information about your without your knowledge, such as your surfing habits and sites you have visited, as well as your credit card information.
  • Adware, or advertising-supporting software, is any software that automatically displays advertisements, usually pop-ups. The purpose of adware is to generate revenue for its author, and while by itself it’s harmless, some adware may be mixed with spyware.
  • Ransomware hijacks the use of your computer until you pay the creator of the malware a certain fee. The number of ransomware scams alone have doubled in the past year.

How to Stop Malware

The best way to prevent your computer from getting infected with malware is to have a good firewall and strong, up to date antivirus software installed on your system. Also, a VPN like PRIVATE WiFi can encrypt all of your online communications, which makes it harder for cybercriminals to get their hands on your private data.

Don’t visit or click on any questionable websites, don’t open any questionable email attachments, don’t download any torrents or shady software and make sure your computer system and plug-ins are up to date.

And definitely don’t infect your computer with malware if you work for a huge retail chain like Target.

Associated Topics:

Associated Topics:


Related Posts

The Three Legs of Protection: Antivirus Software, Firewalls, and VPNs

Thought Leadership
Kent Lawson | Apr 15th, 2015

We've all heard about antivirus software and firewalls. But we probably don’t know as much about the third leg of computer protection: a VPN, or virtual private network. In his latest article, company CEO Kent Lawson says we do this at our peril, because the damage we can suffer from not using a VPN may far outweigh the risks of the other two combined. After the large-scale hack attacks over the past few years, VPNs are now earning their spot as the third security leg that is vital to every-day computer security. Read More

New Hotel WiFi Vulnerability

Thought Leadership
Alok Kapur | Apr 9th, 2015

Earlier this year, the FTC declared a critical announcement for travelers: hotel WiFi is dangerous. Many people assume that because they are paying for it the network must be safe, but that is a dangerous assumption. Hotel WiFi networks are completely insecure; the bad news is that a new exposure in hotel WiFi has just been found. Read more to find out how you can keep yourself protected. Read More

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More


Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.