Bloomberg Businessweek Publishes Brutal Interactive Cover On The Target Hack

Advertisement

Bloomberg Businessweek has published a cover story that slams Target for not doing enough to prevent the massive hack of customer data.

Advertisement

The hack affected 40 million people who shopped at Target between Black Friday and Dec. 15. Hackers stole the information that's stored on the magnetic strip on the backs of credit and debit cards. They pulled it off by installing malware in the company's security and payments system.

Bloomberg's cover story says the hack wasn't "particularly inventive" and that Target was warned about the malware by its security specialists in Bangalore. The company reportedly chose not to act on the warning.

Complimentary Tech Event
Transform talent with learning that works
Capability development is critical for businesses who want to push the envelope of innovation.Discover how business leaders are strategizing around building talent capabilities and empowering employee transformation.Know More

Here's the cover, which is interactive within the story:

Businessweek Target hack

Twitter/@BW

Advertisement

Target gave this statement to Businessweek:

"Target was certified as meeting the standard for the payment card industry (PCI) in September 2013. Nonetheless, we suffered a data breach. As a result, we are conducting an end-to-end review of our people, processes and technology to understand our opportunities to improve data security and are committed to learning from this experience. While we are still in the midst of an ongoing investigation, we have already taken significant steps, including beginning the overhaul of our information security structure and the acceleration of our transition to chip-enabled cards. However, as the investigation is not complete, we don't believe it's constructive to engage in speculation without the benefit of the final analysis."

The whole story has great art, which makes the criticism that much more biting:

Screen Shot 2014 03 13 at 7.45.40 AM

Bloomberg

Go check it out >