LETTERS TO THE EDITOR

LETTERS/COLUMNS: SEND LETTERS TO THE EDITOR FOR PUBLISHING TO FRONTPAGENEWS1@YAHOO.COM. PLEASE INCLUDE DAY/EVENING/ CELL NUMBER, HOME NUMBER, AND EMAIL. CONTACT VAN STONE: FRONTPAGENEWS1@YAHOO.COM OR (215) 821-9147 TO SUBMIT A REQUEST FOR ANY WRITER. PLEASE DO NOT CONTACT THE WRITER DIRECTLY! ALL APPEARANCE REQUEST WILL GO THROUGH THE MANAGING EDITOR'S OFFICE. COPYRIGHT: THE USE OF ANY SUBMISSIONS APPEARING ON THIS SITE FOR MONETARY GAINS IS STRICTLY PROHIBITED. TO LEARN MORE: PHILADELPHIA FRONT PAGE NEWS WWW.FPNNEWS.ORG. YOUR TOP STORIES OF THE DAY (215) 821-9147.

Sunday, December 22, 2013

Weak US card security made Target a juicy target

Weak US card security made Target a juicy target

AP Photo
FILE - In this Jan. 18, 2008 file photo, a customer signs his credit card receipt at a Target store in Tallahassee, Fla. The U.S. is the juiciest target for hackers hunting credit card information. And experts say incidents like the recent data theft at Target's stores will get worse before they get better. That's in part because U.S. credit and debit cards rely on an easy-to-copy magnetic strip on the back of the card, which stores account information using the same technology as cassette tapes. The breach that exposed the credit card and debit card information of as many as 40 million Target customers who swiped their cards between Nov. 27 and Dec. 15 is still under investigation.
 
NEW YORK (AP) -- The U.S. is the juiciest target for hackers hunting credit card information. And experts say incidents like the recent data theft at Target's stores will get worse before they get better.


That's in part because U.S. credit and debit cards rely on an easy-to-copy magnetic strip on the back of the card, which stores account information using the same technology as cassette tapes.

"We are using 20th century cards against 21st century hackers," says Mallory Duncan, general counsel at the National Retail Federation. "The thieves have moved on but the cards have not."

In most countries outside the U.S., people carry cards that use digital chips to hold account information. The chip generates a unique code every time it's used. That makes the cards more difficult for criminals to replicate. So difficult that they generally don't bother.

"The U.S. is the top victim location for card counterfeit attacks like this," says Jason Oxman, chief executive of the Electronic Transactions Association.

The breach that exposed the credit card and debit card information of as many as 40 million Target customers who swiped their cards between Nov. 27 and Dec. 15 is still under investigation. It's unclear how the breach occurred and what data, exactly, criminals have. Although security experts say no security system is fail-safe, there are several measures stores, banks and credit card companies can take to protect against these attacks.

Companies haven't further enhanced security because it can be expensive. And while global credit and debit card fraud hit a record $11.27 billion last year, those costs accounted for just 5.2 cents of every $100 in transactions, according to the Nilson Report, which tracks global payments.

Another problem: retailers, banks and credit card companies each want someone else to foot most of the bill. Card companies want stores to pay to better protect their internal systems. Stores want card companies to issue more sophisticated cards. Banks want to preserve the profits they get from older processing systems.

Card payment systems work much the way they have for decades. The magnetic strip on the back of a credit or debit card contains the cardholder's name, account number, the card's expiration date and a security code different from the three or four-digit security code printed on the back of most cards.

When the card is swiped at a store, an electronic conversation is begun between two banks. The store's bank, which pays the store right away for the item the customer bought, needs to make sure the customer's bank approves the transaction and will pay the store's bank. On average, the conversation takes 1.4 seconds.

During that time the customer's information flows through the network and is recorded, sometimes only briefly, on computers within the system controlled by payment processing companies. Retailers can store card numbers and expiration dates, but they are prohibited from storing more sensitive data such as the security code printed on the backs of cards or other personal identification numbers.

Hackers have been known to snag account information as it passes through the network or pilfer it from databases where it's stored. Target says there is no indication that security codes on the back of customer credit cards were stolen. That would make it hard to use stolen account information to buy from most Internet retail sites. But the security code on the back of a card is not needed for in-person purchases. And because the magnetic strips on cards in the U.S. are so easy to make, thieves can simply reproduce them and issue fraudulent cards that look and feel like the real thing.

"That's where the real value to the fraudsters is," says Chris Bucolo, senior manager of security consulting at ControlScan, which helps merchants comply with card processing security standards.

Once thieves capture the card information, they check the type of account, balances and credit limits, and sell replicas on the Internet. A simple card with a low balance and limited customer information can go for $3. A no-limit "black" card can go for $1,000, according to Al Pascual, a senior analyst at Javelin Strategy and Research, a security risk and fraud consulting firm.

To be sure, thieves can nab and sell card data from networks processing cards with digital chips, too, but they wouldn't be able to create fraudulent cards.

Credit card companies in the U.S. have a plan to replace magnetic strips with digital chips by the fall of 2015. But retailers worry the card companies won't go far enough. They want cards to have a chip, but they also want each transaction to require a personal identification number, or PIN, instead of a signature.

"Everyone knows that the signature is a useless authentication device," Duncan says.

Duncan, who represents retailers, says stores have to pay more - and banks make more - on transactions that require signatures because there are only a few of the older networks that process them, and therefore less price competition. There are several companies that process PIN transactions for debit cards, and they tend to charge lower fees to stores.

"Compared to the tens of millions of transactions that are taking place every day, even the fraud that they have to pay for is small compared to the profit they are making from using less secure cards," Duncan says.

Even so, there are a few things retailers can do, too, to better protect customer data. The most vulnerable point in the transaction network, security experts say, is usually the merchant.

"Financial institutions are more used to having high levels of protection," says Pascual. "Retailers are still getting up to speed."

The simple, square, card-swiping machines that consumers are used to seeing at most checkout counters are hard to infiltrate because they are completely separate from the Internet. But as retailers switch to faster, Internet-based payment systems they may expose customer data to hackers.

Retailers need to build robust firewalls around those systems to guard against attack, security experts say. They could also take further steps to protect customer data by using encryption, technology which scrambles the data so it looks like gibberish to anyone who accesses it unlawfully. These technologies can be expensive to install and maintain, however.

Thankfully, individual customers are not on the hook for fraudulent charges that result from security breaches. But these kinds of attacks do raise costs -and, likely, fees for all customers.

"Part of the cost in the system is for fraud protection," Oxman says. "It costs money, and someone's going to pay for it eventually."
 

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID
Click on the logo to learn about the non-profit status

BECOME OUR VLOGGER OF THE MONTH: VIDEO NEWS CONTENT PUBLISHED ON ANY TOPIC BELOW

Latest edition of Talk Live Philly With Van Stone

VAN STONE PERFORMANCE PROMOTION VIDEO AT WEST PHILADELPHIA HS 1999 - BELOW

FPN NEWS “TAKE TIME FOR WINNERS IN ANY COMMUNITY!”

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection
Family Modeling -modelado de la familia

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

WE'RE #1

WE'RE #1

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones
Family Modeling -modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud
Family Modeling -Modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Child Images -Van Stones Niño hermoso Imágenes

WE'RE #1

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre
Family Modeling -modelado de la familia

Like Us On Facebook

We"re Looking For Volunteers

News, and more about youth, education, political analyst, schools, anti-violence, social justice, grass roots democracy, ecological protection, seniors, Historic Preservation & Restoration, (Black, Latinos, Asian, Pakistani, Italian, and other)Arts, Books, Super Heroes, Trading Cards, Youth, College, and Pro Sports, Nonprofits and Real-estate.

Blog Archive

About Us

  • FPN can reach out to Representatives from your side of: The Village, The Township, or The City
  • FPN features
    Sports
    Cars
    Family Entertainment
    Neighborhood News
    Scholastic News
    Regional News
    National News
    Citywide News
    Legal News
    Alternative Green Energy Education News
    Superhero & Comic Strip News
  • Teen Stars
  • Humanitarian/Ministers/Political
  • Community Services
  • Women & Men & Kids

  • You acknowledge and agree that you may not copy, distribute, sell, resell or exploit for any commercial purposes, any portion of the Newspaper or Services. Unless otherwise expressly provided in our Newspaper, you may not copy, display or use any trademark without prior written permission of the trademark owner.

    FPN/VSP® is in no way responsible for the content of any site owned by a third party that may be listed on our Website and/or linked to our Website via hyperlink. VSP/FPN® makes no judgment or warranty with respect to the accuracy, timeliness or suitability of the content of any site to which the Website may refer and/or link, and FPN/VSP® takes no responsibility therefor. By providing access to other websites, FPN/VSP® is not endorsing the goods or services provided by any such websites or their sponsoring organizations, nor does such reference or link mean that any third party websites or their owners are endorsing FPN/VSP® or any of the Services. Such references and links are for informational purposes only and as a convenience to you.

    FPN/VSP® reserves the right at any time to modify or discontinue, temporarily or permanently, the Website and/or Services (or any part thereof) with or without notice to you. You agree that neither FPN/VSP® nor its affiliates shall be liable to you or to any third party for any modification, suspension or discontinuance of the Website and/or Services.

    You agree to indemnify and hold harmless FPN/VSP®, its subsidiaries, and affiliates, and their respective officers, directors, employees, shareholders, legal representatives, agents, successors and assigns, from and against any and all claims, actions, demands, causes of action and other proceedings arising from or concerning your use of the Services (collectively, "Claims") and to reimburse them on demand for any losses, costs, judgments, fees, fines and other expenses they incur (including attorneys' fees and litigation costs) as a result of any Claims.

    The Website is © 2009 by VSP®, or its designers. All rights reserved. Your rights with respect to use of the Website and Services are governed by the Terms and all applicable laws, including but not limited to intellectual property laws.

    Any contact information for troops overseas and/or soldiers at home provided to you by FPN/VSP® is specifically and solely for your individual use in connection with the services provide by Van Stone Productions Foundation VSP.

    FPN/VSP® soldiers contact information for any other purpose whatsoever, including, but not limited to, copying and/or storing by any means (manually, electronically, mechanically, or otherwise) not expressly authorized by FPN/VSP is strictly prohibited. Additionally, use of FPN/VSP® contact information for any solicitation or recruiting purpose, or any other private, commercial, political, or religious mailing, or any other form of communication not expressly authorized by FPN/VSP® is strictly prohibited.