DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Target Accelerates Implementation of Chip-Enabled Smart Card Technology to Protect Consumers from Fraud

Posted on February 4, 2014 by Dissent

In conjunction with their CFO’s testimony to the Senate Judiciary Committee this morning, Target has issued this press release:

Target Chief Financial Officer John Mulligan, in testimony before the Senate Committee on the Judiciary in Washington, D.C., announced today that the company will be accelerating its implementation of smart card technology designed to dramatically reduce the threat of credit and debit card fraud among guests shopping in its stores.

Mulligan appeared on behalf of Target to discuss the company’s response to the data breach, its efforts to protect its guests and its continued support of industry initiatives to strengthen data security.

During his testimony, Mulligan said Target will equip its proprietary REDcards and all of its store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans. The accelerated timing is part of a $100 million effort to put in place chip-enabled technology in all of Target’s nearly 1,800 U.S. stores.

“Updating payment card technology and strengthening protections for American consumers is a shared responsibility and requires a collective and coordinated response. On behalf of Target, I am committing that we will be an active part of that solution,” Mulligan said.

In 2012, Target became a founding and steering committee member of the EMV Migration Forum at the Smart Card Alliance, a cross-industry body whose goal is to facilitate the adoption and use of smart card technology.

In Tuesday’s hearing, Mulligan committed to working with the business community and other stakeholders to find effective solutions to the ongoing, pervasive challenge of cyber attacks. “To prevent this from happening, none of us can go it alone,” Mulligan said.

Chip-enabled smart cards contain a tiny microprocessor chip that encrypts the transaction data shared with sales terminals used by merchants. As a result, even if the card number is stolen in a data breach, the thieves cannot counterfeit the card. Similar technology already in use in the United Kingdom, Canada and Australia has drastically reduced the incidence of fraud for consumers at physical store locations.

“At Target, we take our responsibilities to our guests very seriously, and this attack has only strengthened our resolve,” Mulligan said in his testimony. “We will learn from this incident and, as a result, we hope to make Target and our industry more secure for consumers in the future.”


Related:

  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Gov't seeks police probe of KT for allegedly obstructing data breach investigation
Category: Business Sector

Post navigation

← TX: 14,000 Midland ISD students risk identity theft because of sloppy security
TX: St. Joseph Health System Confirms Hacking Incident Affecting 405,000 Patients, Employees, and Beneficiaries (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.