HOME     MENU     SEARCH     NEWSLETTER    
THE ENTERPRISE SECURITY SUPERSITE. UPDATED 7 MINUTES AGO.
You are here: Home / CIO Issues / Target Faces Lawsuit for Data Breach
Target Facing Class Action Suit Over Data Breach
Target Facing Class Action Suit Over Data Breach
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
DECEMBER
20
2013
In the wake of a data breach that exposed the personal identifying information of 40 million Target consumers, a customer has filed a lawsuit against the discount retailer in a San Francisco federal court. Attorneys are seeking class action status.

The lawsuit claims negligence and invasion of privacy. The suit also alleges the stolen data may make it possible for criminals to create counterfeit credit cards by encoding the stolen information onto plastic cards that contain a magnetic strip. Finally, the suit claims the breach may also have revealed consumers’ personal debit card codes.

“Target failed to implement and maintain reasonable security procedures and practices appropriate to the nature and scope of the information compromised in the data breach,” according to the complaint.

Is a Lawsuit Really Necessary?

A class action suit against Target could open up a Pandora’s Box. Security industry analysts are waiting and watching, but it seems a class action suit may be a reach considering the damages.

“I did some traditional shopping at Target between November 27 and December 15, and so I am in the affected customer set. Unfortunately, beyond canceling one's credit card -- which is a hassle -- there is not much a customer can do in such a situation,” Wolfgang Kandek, CTO of Qualys, told us.

“I have started to log into my credit card account more frequently and check my transactions, but otherwise I am trusting the fraud detection algorithms that my credit card company uses, plus their 60-day claim guarantee. It will be interesting to see how the attackers got into the network and what technical countermeasures were in place, but that will take months to surface as the forensics in such a case are extremely time consuming,” he said.

The Nature of Modern Threats

We asked Chris Petersen, CTO and co-founder of LogRhythm, a log analysis firm, for his take on the breach. He told us Target has likely invested heavily in security, in technologies and approaches many would consider modern and right. Unfortunately, he added, today’s threats are quickly outpacing current security technologies and approaches -- what was recently modern and right, is quickly becoming outdated and ineffective.

"Companies are in an arms race against determined foes, whether they be cybercriminals, hacktivists or nation states,” Petersen said. “Their only hope of defending themselves is to ensure their defenses are truly modern. In some cases, this might mandate running next generation technologies in parallel with their legacy counterparts."

As he sees it, one specific area of modern investment is an analytics-driven defense. Only until very recently could companies leverage big data to root out threats they would otherwise be blind to.

“When big data is combined with machine-based behavioral analytics, the types of threats able to evade existing defenses can be detected early, prior to a large scale breach occurring,” Petersen said. “When networks are infiltrated and systems inappropriately accessed, normal behaviors within the IT environment will shift. When these behavioral shifts are recognized early, data breaches can be avoided."

Tell Us What You Think
Comment:

Name:

Deliberate Holes in our s:
Posted: 2014-05-30 @ 11:38am PT
I'd like to know whether the vulnerability was induced by the NSA or FBI as part of they're data gathering systems? Are we being fleeced for sake of someone else's prescribed security measures...

Jon H:
Posted: 2013-12-23 @ 7:51am PT
@Mike: Great idea!

Mike Jones:
Posted: 2013-12-23 @ 4:27am PT
Target should be required to and agree to provide free credit monitoring for a period of 18 months to those that had their information compromised.

rsa:
Posted: 2013-12-20 @ 5:29pm PT
I hate to say it but that is part of the risk we all take by using credit cards for everything. It would have been nice if they would have let us know right away when they found out though.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
High Quality CRM Data: Prevent, detect and fix errors at the point of data entry for Dynamics CRM. Trillium Software helps you achieve an accurate, synchronized, single view of customers. It's time to trust your data. Take a product tour and read CRM Analyst opinions here.
MORE IN CIO ISSUES
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.