Buckle May Have Had Credit Cards Exposed For Six Months

Have you shopped at a clothing store called Buckle? If you were a patron of any of their 450+ stores during the period spanning from October 28, 2016 to April 14, 2017, then your credit card information has likely been compromised.

According to a company spokesman, the data most likely at risk is as follows:

• Credit Card Number
• Credit Card Expiration Date
• And Customer Name

No other data was harvested (although this is certainly enough to be damaging), and the company has yet to release any information on the total number of stores that were impacted or the total number of customers who were compromised.

There are a couple of interesting things to talk about where this latest breach is concerned, and Buckle makes a good case study of how not to handle the aftermath of a large-scale data breach.

In the first place, the company is only notifying their customers now, some two months after they found out about the breach. After two months of intensive investigation, it seems curious that the company does not yet have precise details on the number of impacted users, or at the very least, the number of stores. In the absence of this information, the only safe thing to do is to assume that all stores were breached, and every shopper who made a purchase during the timeframe is at risk.

Secondly, the company says that the malware was “quickly and easily removed from all impacted POS terminals,” which is a good thing. But if it was such a trivial task to remove it, then it raises questions about the current state of their data security that let it in, and allowed it to run for six months undetected.

Unfortunately, the details above represent the sum total of all information provided by Buckle so far, two months after the attack. So, again, if you’ve made a purchase from the store during that timeframe, you may be at risk.

Used with permission from Article Aggregator

Kinetica scores $50 million Series A for super-charged in-memory database solution

 Kinetica’s roots as a company go back to a 2009 consulting project for US intelligence services. When they couldn’t find a solution on the market to meet the strict demands of the army and NSA to track terrorists in real-time, they decided to build it. Today, it’s an in-memory database solution that relies on commodity hardware running Nvidia GPUs to supercharge the processing.… Read More

AppDynamics update pinpoints performance issues inside Docker containers

 AppDynamics released an update today with a nod toward the growing trend of containerization. The company, which was purchased by Cisco earlier this year for $3.7 billion, wants to help customers using Docker containers pinpoint performance issues. Read More

Adobe releases analytics tools for conversational AI

 It’s still hard to say if the voice-controlled aluminum can will be the next smartphone or the next Segway, but either way, brands are preparing. This morning Adobe launched a new set of analytics tools, Adobe Sensei for Voice, to help brands take advantage of conversational data to improve targeting and, ideally, conversions.
Adobe says it can consume data from Alexa, Siri, Google… Read More

Crunch Report | Blue Apron IPO Has A Rocky Start

Crunch Report 6.29 Today’s Stories 

Blue Apron IPO off to a rough start
Microsoft confirms Cloudyn acquisition, sources say price is between $50M and $70M
Instagram implements an AI system to fight mean and harassing comments
Uber crosses the 5 billion trip milestone amid ongoing issues
A brief history of the iPhone

Written and Hosted by: Anthony Ha
Filmed by: Matthew Mauro
Edited by: Joe… Read More

Even Google Can Get Hacked

Google has a rock-solid reputation and an almost uncanny ability to ward off hacking efforts, but even they aren’t infallible. Even they can be hacked, as a recent incident involving Google News has demonstrated.

In the early morning hours of June 12, the news service was temporarily overrun, and all the leading news stories were replaced by spam content hawking dating sites, Viagra and an assortment of other drugs. The attack only succeeded for a short time before it was pushed back and relegated to the Health section.

Upon further investigation, Google reported that the hack wasn’t aimed directly at them. Rather, it was a coordinated attack on a number of news sites who publish the content Google displays on Google News, and as a result of those hacks, malicious links were inserted into the content, which was how they showed up on the Google News feed.

A spokesman for Palate Press, one of the hacked sites, had this to say: “We are not sure how the hackers got in, but it took two days to clear out the thousands upon thousands of malicious files. Once that was done we had to ask Google and Bing to recrawl the site to flush out the bad links.”

For their part, Google reiterated that no human editors are involved in the story selection process or in deciding which stories deserve top placement and best visibility. That is determined by the freshness, diversity and originality of the content in the article in question.

No matter who you are, how big your company is or how robust your digital security is, hackers will always find a way. Given that reality, the best you can do is take all reasonable precautions, and have a rapid response plan in place for the day when the inevitable occurs.

Used with permission from Article Aggregator

The next generational shift in enterprise infrastructure has arrived

 Cloud computing is driving growth at 3 of the 5 most valuable companies in the world. AI will impact jobs only as quickly as AI-powered business software evolves. These are just two of the ramifications of disruptions in enterprise technology permeating mainstream media. Yet the inner workings of the tightly knit enterprise software industry are rarely publicized. Read More

Salesforce introduces several Einstein AI tools for third-party developers

 Salesforce launched three AI tools for developers today at the TrailheaDX developer conference. These algorithms, which fall under the new Einstein Platform Services, enable third-party developers to add Einstein intelligence to applications built on top of the Salesforce platform. The new services include sentiment and intent analysis and some pretty sophisticated image recognition… Read More

As Egnyte turns 10, it moves into data protection

 Egnyte had a big milestone last week. It turned 10 years old, which is a pretty big deal for a startup. The company has survived and even thrived, but as it moves into its second decade, it recognizes that it can’t live on file sync and share alone, and today it announced the general availability of a new product called Egnyte Protect. The product was introduced in Beta last year, but… Read More

Intercom lands former Intuit exec Karen Peacock as its new COO

Karen Peacock, COO at Intercom Intercom, a business messaging tool that enables companies to communicate directly with customers in an online context, announced today that it has hired former Intuit SVP Karen Peacock as company COO.
She joined the company May 30th, but they are making the news public for the first time today.
Peacock comes with an impressive resume that starts with a BA from Harvard and an MBA from Stanford. Read More