It Must Be Christmas Time, Because Target Is Losing People's Personal Information Again
from the targeted-app dept
The season of Christmas is upon us. You can feel it everywhere, from the holiday decorations, to the television specials, to the waning interest in workplace productivity. Oh, yeah, and Target is back in the news for losing people's personal information again.
Hackers can access your personal information from Target -- again -- thanks to a flaw in the retailer's mobile app. In a blog post Tuesday, researchers from security company Avast revealed the flaw, which allows unauthorized access to customers' addresses, phone numbers and other personal information from wish lists created with the Target app. The only merry tidings are that credit card numbers don't appear to be stored with the wish lists, so financial information isn't vulnerable.This of course reminds shoppers everywhere of that time Target was the victim of a hack that resulted in the exposure of millions of customers' credit card information. That breach was so bad, and the news of it so well circulated, that Target set up a website page dedicated to telling customers all about it, assuring them not only that they wouldn't be responsible for any charges on those credit cards, but also assuring customers that the company was, like, super dedicated to security moving forward.
We are committed to making this right and are investing in the internal processes and systems needed to reduce the likelihood that this ever happens again. For example, we are accelerating our plans to put chip-enabled technology in our stores and on our Target REDcards by early 2015, six months ahead of our previous plan.The vulnerability of the Target app, however, isn't something that could be prevented by a chip. It would have required something as technologically advanced as basic authentication, according to Avast, which published the vulnerability.
To our surprise, we discovered that the Target app’s Application Program Interface (API) is easily accessible over the Internet. An API is a set of conditions where if you ask a question it sends the answer. Also, the Target API does not require any authentication. The only thing you need in order to parse all of the data automatically is to figure out how the user ID is generated. Once you have that figured out, all the data is served to you on a silver platter in a JSON file.So much for all that dedication to security. Merry Christmas, Target shoppers!
The JSON file we requested from Target’s API contained interesting data, like users’ names, email addresses, shipping addresses, phone numbers, the type of registries, and the items on the registries.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: data breach, personal info
Companies: target
Reader Comments
Subscribe: RSS
View by: Time | Thread
Customers are asking for it
[ link to this | view in thread ]
[ link to this | view in thread ]
Targeting Target Shoppers
[ link to this | view in thread ]
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
Then we can pass the savings on to you!
[ link to this | view in thread ]
I think you need to investigate the definition of lose.
[ link to this | view in thread ]
Had it been an independent white hat hacker that revealed that there is a flaw he would have been crucified on a cross for potentially breaking all sorts of laws. But because it's a relatively big business with resources that can defend itself it's perfectly OK. Some justice system.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re:
If you lost weight you will get an add that says "congratulations, you lost five pounds! Do you know how you can lose even more weight? With this new and innovative diet program ..."
If you gained weight you will get a commercial that says "Are you sick and tired of gaining weight. Do you need a new diet program? Well, we've got just the thing!!! ...."
If you're under weight you will get relevant commercials.
I need to be careful not to give these marketers any ideas, I can picture them reading this and drooling over the idea of implementing it.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Hmm. I see a market opportunity here. Delivery vehicles that are shielded and will kill all electronics buried in your purchases. House sniffing for unwanted surveillance equipment. Faraday cage briefcases and purses. ..... wait. ... someone beat me to those two.
[ link to this | view in thread ]
Re:
Just? How do you "just" create an EMP?
[ link to this | view in thread ]