Feeds

Geeks.com settles charges claiming its security was crap

A decade in the stockade

Internet Security Threat Report 2014

Geeks.com, a large online seller of computer hardware and software, has agreed to allow federal regulators to monitor its website security for 10 years to settle charges it violated federal laws requiring it to adequately safeguard sensitive customer data.

The agreement, which also applies to sister site computergeeks.com, settles a complaint filed by the Federal Trade Commission that accused the online retailers of misleading its customers about the safety of their personal information. Names, addresses, credit card numbers, and other data were routinely sent unencrypted to authorization services, making them ripe for identity thieves, the complaint alleged.

What's more, the sites carried privacy policies that claimed the company employed "secure technology, privacy protection controls and restrictions on employee access in order to safeguard your personal information."

During a six-month period starting in January of 2007, the sites were breached repeatedly by hackers who used simple SQL injections to siphon credit card numbers, expiration dates, and other sensitive details on hundreds of customers. Website operators didn't learn of the attacks until the following December. During the time of the breach, Geeks.com proudly displayed a banner provided by security provider McAfee claiming the site was "Hacker Safe".

The sites have since closed the security holes and notified law enforcement authorities.

Genica Corp., the websites' parent company, has agreed to submit its website security to outside auditing by qualified security professionals every other year and to make the results available to FTC officials. The agreement will remain in place for the next decade. The company also agreed not to make misleading claims about its website security.

Even with federal charges settled, Genica is likely to have some explaining to do with the credit card industry. Payment card industry regulations require merchants to follow a maze of procedures designed to protect card data as it's stored on servers and zapped to authorization services. Penalties for violations can be steep.

The FTC's complaint and settlement (both of them PDFs) are here, and here respectively. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.