DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Target Accelerates Implementation of Chip-Enabled Smart Card Technology to Protect Consumers from Fraud

Posted on February 4, 2014 by Dissent

In conjunction with their CFO’s testimony to the Senate Judiciary Committee this morning, Target has issued this press release:

Target Chief Financial Officer John Mulligan, in testimony before the Senate Committee on the Judiciary in Washington, D.C., announced today that the company will be accelerating its implementation of smart card technology designed to dramatically reduce the threat of credit and debit card fraud among guests shopping in its stores.

Mulligan appeared on behalf of Target to discuss the company’s response to the data breach, its efforts to protect its guests and its continued support of industry initiatives to strengthen data security.

During his testimony, Mulligan said Target will equip its proprietary REDcards and all of its store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans. The accelerated timing is part of a $100 million effort to put in place chip-enabled technology in all of Target’s nearly 1,800 U.S. stores.

“Updating payment card technology and strengthening protections for American consumers is a shared responsibility and requires a collective and coordinated response. On behalf of Target, I am committing that we will be an active part of that solution,” Mulligan said.

In 2012, Target became a founding and steering committee member of the EMV Migration Forum at the Smart Card Alliance, a cross-industry body whose goal is to facilitate the adoption and use of smart card technology.

In Tuesday’s hearing, Mulligan committed to working with the business community and other stakeholders to find effective solutions to the ongoing, pervasive challenge of cyber attacks. “To prevent this from happening, none of us can go it alone,” Mulligan said.

Chip-enabled smart cards contain a tiny microprocessor chip that encrypts the transaction data shared with sales terminals used by merchants. As a result, even if the card number is stolen in a data breach, the thieves cannot counterfeit the card. Similar technology already in use in the United Kingdom, Canada and Australia has drastically reduced the incidence of fraud for consumers at physical store locations.

“At Target, we take our responsibilities to our guests very seriously, and this attack has only strengthened our resolve,” Mulligan said in his testimony. “We will learn from this incident and, as a result, we hope to make Target and our industry more secure for consumers in the future.”

Category: Business Sector

Post navigation

← TX: 14,000 Midland ISD students risk identity theft because of sloppy security
TX: St. Joseph Health System Confirms Hacking Incident Affecting 405,000 Patients, Employees, and Beneficiaries (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.