Fred’s Investigates Security Breach On Two Servers

fredsDiscount retail chain Fred’s has revealed that a hacker gained access to two servers that process payments data after credit and debit cards are swiped. The hacker placed a malware program capable of copying payment card data on both servers on March 23, according to a company regulatory filing. The program appeared to stay active on one server until April 8 and on another server until April 24.

The malware program was designed to search for and retrieve track 2 data — data from payment card magnetic stripes including the card number, expiration date and verification code. However, Fred’s did not find evidence that the track 2 data was removed from the company’s system, according to the filing. No other customer information was at risk during the breach.


52% Of SMBs Will Not Be EMV-Ready By Oct. 1 Deadline

EMV-2More than half (52%) of SMBs will not be EMV-ready when the EMV liability shift deadline passes on Oct. 1, 2015, while 37% of SMBs still have no plans to accept EMV cards after the deadline, according to a study from payment solutions provider Cayan.

Cayan surveyed 344 small business owners and managers in June 2015 for the study designed to uncover tactics for SMBs that currently have no existing EMV plans to transition to EMV-enabled technology after October 1.

Read more... Helps Improve Mobile Payment Security

Consumers are becoming more comfortable purchasing items through their mobile devices. As retailers integrate mobile payment into their commerce strategies, they must ensure they have the solutions and systems in place to keep customer data secure. is a mobile payment platform for browser-based e-Commerce and m-Commerce that includes secure multi-factor authentication. The app’s FonePrint multi-factor authentication combines a smartphone’s hardware with user information to create a “mobile fingerprint,” providing anonymous payments for confidential purchases.


Top 7 Priorities For Retail CIOs Today

VP head shot Oracle
The vast majority of retail business transformations are technology led, placing CIOs in strategic partnership with leaders across their organization.

As retailers enter new markets, improve the online shopping experience, or expand a product category, underlying technologies can determine the success, speed to market and profitability of each venture. In his annual list of strategic issues for the CIO, tech blogger and Oracle Chief Communications Officer Bob Evans estimates that CIOs will fulfill multiple roles and tackle some key business priorities as they work alongside their peers to effect business change and growth.


Natural Grocers Investigates Possible Data Breach

Natural Grocers by Vitamin Cottage is investigating a possible data breach involving an “unauthorized intrusion targeting limited customer payment data,” according to a company statement.

The grocery retailer has not received reports of fraudulent card use from any customer, credit card company or financial institution. In a statement published on the company web site, Natural Grocers indicated: “There is no evidence that PIN numbers or card verification codes were accessed. Finally, no personally identifiable information, such as names, addresses or Social Security numbers, was involved, as the company does not collect that data as part of its payment processing system.”


Most Consumers Carry Less Than $20 In Cash

walletIn today’s omnichannel environment, retailers are pressured to provide exemplary service at every touch point. Some retailers are even refining their payment offerings to become more digital, which aligns significantly with customer wants and needs.

After all, more than 55% of consumers say they carry less than $20 in cash with them on a typical day, according to research from SecureNet. Among 18-to-29-year-old shoppers, that total leaps to 68%.


How To Protect Your Organization From Backoff Malware

VP site only head shot IDTBackoff malware is giving retailers a new cyber threat to worry about. With instances of this new attack vector appearing as far back as late 2013, security researchers digging into Backoff’s reach recently announced the massive Target breach involved something in the Backoff-style family (with at least three known variants, the details of which were used against Target are still unclear). Sneaky and durable, Backoff is exactly the kind of malware retailers should work to avoid.


IBM Study: Consumers Want Inventory Visibility

IBM studyUnveiled at the 2015 NRF BIG Show, the IBM Institute For Business Value study found that consumers are looking for better inventory visibility and more personalized offers. The research featured data from more than 110,000 consumers in 19 countries, collected over four years.

As shoppers spend more time researching product availability before they head out to a store, they have become less tolerant of out-of-stock (OOS) scenarios. As many as 66% said that it is important to confirm an item is available before entering the store. And when presented with an OOS in-store, 46% of shoppers expect store associates armed with mobile devices to rectify the problem.


Chick-fil-A Investigates Potential Breach

chickfilaChick-fil-A has announced that it is working with law enforcement and security experts to investigate suspicious activity involving payment cards used at several of its restaurants.

The fast food chain received initial reports from payment industry contacts on December 19 and is working to confirm whether a breach did, in fact, take place. However, security expert Brian Krebs indicated in an article that he first heard rumblings of a potential breach in November.

Subscribe to this RSS feed