{"id":1284,"date":"2014-02-03T19:37:05","date_gmt":"2014-02-03T19:37:05","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?p=1284"},"modified":"2014-02-03T19:37:37","modified_gmt":"2014-02-03T19:37:37","slug":"cybersecurity-experts-warn-target-data-breach-is-only-the-beginning","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=1284","title":{"rendered":"Cybersecurity experts warn Target data breach is only the beginning"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=1284\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>Until 2013, the data breach that affected millions of T.J. Maxx and Marshalls shoppers almost a decade ago reigned supreme in the annals of retail hacking.<\/p>\n<p>The holiday-season attack on Target, the nation\u2019s third-largest retailer, made that episode seem almost trifling by comparison. From Thanksgiving week into December, the year\u2019s busiest buying period, <a href=\"http:\/\/www.providencejournal.com\/business\/content\/20131222-weak-us-card-security-made-target-a-juicy-target.ece\" target=\"_blank\"><span style=\"color: #0066cc\">personal information of up to 110 million Target customers was stolen<\/span><\/a> \u2014 and the repercussions for the company, for consumers, and for the retailing industry are likely to persist for months, if not years.<\/p>\n<p>\u201cThe Target hacking was an earthquake in comparison with previous ones,\u201d said Eugene Fram, professor emeritus of marketing with Rochester Institute of Technology\u2019s Saunders College of Business.<\/p>\n<p>And the worst almost certainly is yet to come, the FBI maintains.<\/p>\n<p>In a recent confidential report to retailers, the agency warned of the spread of malicious software \u2014 malware \u2014 that can clandestinely penetrate so-called point-of-sale systems, the means by which retailers conduct transactions. Credit-card swiping machines, which connect to a company\u2019s computer network, typically through the Internet, are a common POS device.<\/p>\n<p><a href=\"http:\/\/www.providencejournal.com\/breaking-news\/content\/20140201-cybersecurity-experts-warn-target-data-breach-only-the-beginning.ece\">More available from ProvidenceJournal.com by clicking here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Until 2013, the data breach that affected millions of T.J. Maxx and Marshalls shoppers almost a decade ago reigned supreme in the annals of retail hacking. The holiday-season attack on Target, the nation\u2019s third-largest retailer, made that episode seem almost &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=1284\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1284","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1284"}],"version-history":[{"count":2,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1284\/revisions"}],"predecessor-version":[{"id":1286,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1284\/revisions\/1286"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}