Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: Malware infestation responsible for credit card data breach

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____/ nessuno@xxxxxxxxxxxxxxxxxxx on Wednesday 21 January 2009 15:51 : \____

> 
> 
> <Quote>
> payment processor Heartland Payment Systems has potentially leaked up
> to 100 million credit and debit accounts into the black market. That
> number, if verified, would make this the largest data breach on
> record....
> 
> [They think it was responsible for December surge in credit card
> fraud...]
> 
> One of the systems in the payment processing chain had been infected
> with an unidentified bit of malware designed to track and report the
> magnetic information stored on the back of a credit card as that data
> was sent through the processing, err, process.
> </Quote>
> 
>
http://arstechnica.com/news.ars/post/20090120-malware-infestation-responsible-for-credit-card-data-breach.html
> 
> No word yet as far as I can tell which OS the malware was running on.

Maybe they use Wine on Linux on this mission-critical system. ;-)


- -- 
                ~~ Best of wishes

Roy S. Schestowitz      |    Play Othello: http://othellomaster.com
http://Schestowitz.com  | Free as in Free Beer |  PGP-Key: 0x74572E8E
Cpu(s): 22.6%us,  5.0%sy,  0.1%ni, 70.6%id,  1.3%wa,  0.0%hi,  0.4%si,  0.0%st
      http://iuron.com - semantic engine to gather information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkl3ZlYACgkQU4xAY3RXLo7gngCfcuayNZg3FZRYwrTEFOCRBXaE
kysAnRpF1RFf4w2/13EKkFGiG/HSHiw5
=9L1D
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index