![]() At the point of sale, everything is hard-wired, and there’s no way a hacker’s going to get that (data),” Harrison said. “We do have wireless technology in the store, but it’s all back-end stuff. Home Depot stores use “line busting” technology, where items being purchased by a customer on an excessively long checkout line are scanned by an employee with a wireless device, speeding up the checkout process. ![]() Wal-Mart didn’t immediately return phone calls.ĭon Harrison, spokesperson for Home Depot, said any wireless traffic at Home Depot stores is limited to price scanning information - no credit card data is ever transmitted through the air. Several researchers told they’d been able to spy traffic at Wal-Mart and Home Depot stores. “Customer privacy is of the utmost importance to Best Buy and we will further investigate,” she said. The company responded quickly on Wednesday - spokesperson Donna Beadle, in an e-mail, said the company had “deactivated our wireless temporary cash registers that transmit information via LAN connections.”īeadle added that wireless terminals actually represented a small percentage of transactions. 1 consumer electronics retailer with 480 stores, was the retailer most often cited in the notes. Credit card purchases still require authorization from a bank, meaning the traffic must travel over a phone line.īest Buy, the nation’s No. However, Ray Martino, Symbol’s vice president of wireless network products, said that credit card data wouldn’t normally be among the traffic that’s broadcast through the air. “If the security is not turned on, then the traffic would be open.” “There are security mechanisms in place, but whether or not (the stores) use them is a different story,” Ferrone said. The firm couldn’t say which large retailers actually deploy their wireless point of sale technology, but Wal-Mart, Best Buy and Home Depot are among Symbol’s broad customer base, he said. Symbol makes hardware used by IBM in its wireless point-of-sale terminals. Ferrone, spokesperson for Symbol Technologies, Inc., said stealing wireless cash register traffic is feasible if proper security measures are not in place. ![]() Several researchers chimed in to say it was old news, discovered by the computer underground as much as two years ago. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |