DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Target Accelerates Implementation of Chip-Enabled Smart Card Technology to Protect Consumers from Fraud

Posted on February 4, 2014 by Dissent

In conjunction with their CFO’s testimony to the Senate Judiciary Committee this morning, Target has issued this press release:

Target Chief Financial Officer John Mulligan, in testimony before the Senate Committee on the Judiciary in Washington, D.C., announced today that the company will be accelerating its implementation of smart card technology designed to dramatically reduce the threat of credit and debit card fraud among guests shopping in its stores.

Mulligan appeared on behalf of Target to discuss the company’s response to the data breach, its efforts to protect its guests and its continued support of industry initiatives to strengthen data security.

During his testimony, Mulligan said Target will equip its proprietary REDcards and all of its store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans. The accelerated timing is part of a $100 million effort to put in place chip-enabled technology in all of Target’s nearly 1,800 U.S. stores.

“Updating payment card technology and strengthening protections for American consumers is a shared responsibility and requires a collective and coordinated response. On behalf of Target, I am committing that we will be an active part of that solution,” Mulligan said.

In 2012, Target became a founding and steering committee member of the EMV Migration Forum at the Smart Card Alliance, a cross-industry body whose goal is to facilitate the adoption and use of smart card technology.

In Tuesday’s hearing, Mulligan committed to working with the business community and other stakeholders to find effective solutions to the ongoing, pervasive challenge of cyber attacks. “To prevent this from happening, none of us can go it alone,” Mulligan said.

Chip-enabled smart cards contain a tiny microprocessor chip that encrypts the transaction data shared with sales terminals used by merchants. As a result, even if the card number is stolen in a data breach, the thieves cannot counterfeit the card. Similar technology already in use in the United Kingdom, Canada and Australia has drastically reduced the incidence of fraud for consumers at physical store locations.

“At Target, we take our responsibilities to our guests very seriously, and this attack has only strengthened our resolve,” Mulligan said in his testimony. “We will learn from this incident and, as a result, we hope to make Target and our industry more secure for consumers in the future.”

No related posts.

Category: Business Sector

Post navigation

← TX: 14,000 Midland ISD students risk identity theft because of sloppy security
TX: St. Joseph Health System Confirms Hacking Incident Affecting 405,000 Patients, Employees, and Beneficiaries (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.