Feeds

Visa dumps Global Payments after it flashed 1.5m US card numbers

Processing firm: This was our first intrusion...

Reducing security risks from open source software

Visa has dropped Global Payments from its list of approved service providers after a security breach at the firm exposed 1.5 million US card numbers.

The world's largest credit and debit card company has booted Global Payments off its list because of the "unauthorised access into a portion of [its] processing system". Global can't get back on Visa's nice list until it has revalidated its compliance processes with the payment card industry's data security standard (PCI DSS).

"It’s essential that every business that handles payment card information adhere to the highest standards to protect the security and privacy of cardholder information and remain vigilant over time," Visa said in an emailed statement.

"Validation is typically an annual process whereas actually being PCI DSS compliant is an ongoing responsibility. The PCI DSS remains an effective security tool when implemented properly – and remains the best defence for businesses against the loss of sensitive data."

Global Payments reported on Friday that it had sniffed out unauthorised access into its systems and said today that its investigation so far showed the breach had only slurped so-called Track 2 card data only, leaving cardholder names, addresses and social security numbers out of the hackers' reach.

"I am pleased to inform you we are making significant progress in defining and rectifying the breach," CEO Paul Garcia said in a conference call. "Based on forensic analysis to date, network monitoring and additional security measures, we believe that this incident is contained."

Garcia said that "on reflection, it was not unexpected" that Visa would dump it from its approved provider list.

"You are compliant, and then if something [like this] happens, by definition you're not.

"We are focused on the remediation measures necessary for a full and timely PCI reinstatement," he said, adding that the firm couldn't put any timeline on how long it would take to be compliant again.

Global Payments said that as far as it knew, there had been no fraudulent transactions reported on any credit cards, but it advised consumers to monitor their bills and make sure all their purchases were legitimate.

Garcia also said that there had been a lot of misinformation about the state of Global Payments' security. He denied reports that there had been another data breach last year, saying that this intrusion was the first.

He said that Global Payments had detected the possibility that data might have been taken three weeks ago and "within hours" it had informed the authorities and card companies. ®

Mobile application security vulnerability report

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.