Tech content trusted by users in North America and around the world
7,299 Reviews & Articles | 53,286 News Posts

Kmart servers affected, credit and debit card details possibly stolen

Kmart is working with its banking partners and federal authorities to investigate in this matter & provided credit monitoring service for its customers
By: Roshan Ashraf Shaikh | Hacking & Security News | Posted: Oct 12, 2014 2:25 pm

Things do not look good as Sears Holding Corp said on Friday that its Kmart retail chains customer database may have been compromised last month. As a result, some of its customer's credit card and debit card details may have been stolen.

 

kmart_servers_affected_credit_and_debit_card_details_possibly_stolen_1

 

The company said on Friday that its Kmart's servers was affected by a malware. Kmart was not able to say how many customers are affected, and according to their investigation so far, no debit card pin numbers, email and phone contacts, social security number and personal information was stolen.

 

But, to be on the safe side, Kmart made an announcement that it will be providing a free credit-monitoring service for its customers who used a debit or a credit card during since last month until Thursday. Customers can then call Kmart customer service and report the unauthorized charges immediately. In the meantime, the company hired a security firm to look into the matter while working with its banking partners and federal authorities.

 

It should be noted that many credit card companies are ramping its efforts to battle such data theft and breaches by switching over to microchip-embedded credit and debit cards. High-profile data theft is on a rise, and it was a few weeks ago when Home Depot who reported that 56 million credit card and debit card details were compromised. To avoid the situation in advance, its best Kmart shoppers who used their credit and debit cards since last month should get their card replaced.

NEWS SOURCES:Usatoday.com

Related Tags

Got an opinion on this news? Post a comment below!
loading