[Cryptography] cost-watch - the cost of the Target breach
ianG
iang at iang.org
Fri Dec 5 11:14:06 EST 2014
I often point out that our security model thinking is typically informed
by "stopping all breaches" rather than "doing less damage." Here's some
indication of damage.
http://bits.blogs.nytimes.com/2014/12/04/banks-lawsuits-against-target-for-losses-related-to-hacking-can-continue/?smid=tw-nytimestech&seid=auto&_r=0
...
The ruling is one of the first court decisions to clarify the legal
confusion between retailers and banks in data breaches. In the past,
banks were often left with the financial burden of a hacking and were
responsible for replacing stolen cards. The cost of replacing stolen
cards from Target’s breach alone is roughly $400 million — and the
Secret Service has estimated that some 1,000 American merchants may have
suffered from similar attacks.
The Target ruling makes clear that banks have a right to go after
merchants if they can provide evidence that the merchant may have been
negligent in securing its systems.
...
At the time of its breach last year, Target had installed a $1.6 million
advanced breach detection technology from the company FireEye.
But according to several people briefed on its internal investigation
who spoke on the condition of anonymity, the technology sounded alarms
that Target did not heed until hackers had already made off with credit
and debit card information for 40 million customers and personal
information for 110 million customers.
More information about the cryptography
mailing list