Violation of Hersheypark's payment system

The , of the well-known chocolate factory in Pennsylvania, received a report that the processing systems that uses, appear to have been compromised. Upon this report the company immediately started an investigation into the matter.

Several financial institutions have observed a series of suspicious transactions executed from company accounts, as Brian Krebs said on the security blog.hersheypark

Hersheypark was founded in 1906 as a relaxation area for employees of Hershey chocolate company, but has been extended over the years to one of the most sought-after state attractions, with over 3 millions of visitors in recent years.

In an effort to protect their consumers and their money, banks are watching underground forums featuring cyber criminals who are trying to sell stolen credit cards. When they see a new supply of data, they purchase a small portion of the file to determine its origin.

In fact, Hershey Entertainment and Resorts Company officially announced to Krebs that it received complaints from customers who detected suspicious movements in their accounts after visiting the entertainment business.

Kathleen McGraw, communications manager for the company, said they take security issues very seriously, especially when it comes to των δεδομένων των πελατών τους. Αν και η εταιρεία διαθέτει δικά της συστήματα ασφαλείας για παραβιάσεις στο , ξεκίνησαν άμεσα οι έρευνες  και μάλιστα προσέλαβαν και εξωτερικούς συνεργάτες ώστε να εντοπίσουν το and shield their systems.

The interval in which the violation was observed was set from mid-March to late May of 2015.

SecNews

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).