DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Target Accelerates Implementation of Chip-Enabled Smart Card Technology to Protect Consumers from Fraud

Posted on February 4, 2014 by Dissent

In conjunction with their CFO’s testimony to the Senate Judiciary Committee this morning, Target has issued this press release:

Target Chief Financial Officer John Mulligan, in testimony before the Senate Committee on the Judiciary in Washington, D.C., announced today that the company will be accelerating its implementation of smart card technology designed to dramatically reduce the threat of credit and debit card fraud among guests shopping in its stores.

Mulligan appeared on behalf of Target to discuss the company’s response to the data breach, its efforts to protect its guests and its continued support of industry initiatives to strengthen data security.

During his testimony, Mulligan said Target will equip its proprietary REDcards and all of its store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans. The accelerated timing is part of a $100 million effort to put in place chip-enabled technology in all of Target’s nearly 1,800 U.S. stores.

“Updating payment card technology and strengthening protections for American consumers is a shared responsibility and requires a collective and coordinated response. On behalf of Target, I am committing that we will be an active part of that solution,” Mulligan said.

In 2012, Target became a founding and steering committee member of the EMV Migration Forum at the Smart Card Alliance, a cross-industry body whose goal is to facilitate the adoption and use of smart card technology.

In Tuesday’s hearing, Mulligan committed to working with the business community and other stakeholders to find effective solutions to the ongoing, pervasive challenge of cyber attacks. “To prevent this from happening, none of us can go it alone,” Mulligan said.

Chip-enabled smart cards contain a tiny microprocessor chip that encrypts the transaction data shared with sales terminals used by merchants. As a result, even if the card number is stolen in a data breach, the thieves cannot counterfeit the card. Similar technology already in use in the United Kingdom, Canada and Australia has drastically reduced the incidence of fraud for consumers at physical store locations.

“At Target, we take our responsibilities to our guests very seriously, and this attack has only strengthened our resolve,” Mulligan said in his testimony. “We will learn from this incident and, as a result, we hope to make Target and our industry more secure for consumers in the future.”

Category: Business Sector

Post navigation

← TX: 14,000 Midland ISD students risk identity theft because of sloppy security
TX: St. Joseph Health System Confirms Hacking Incident Affecting 405,000 Patients, Employees, and Beneficiaries (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6
  • Official Indiana .gov email addresses are phishing residents
  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.