Categories: Security

Acer Security Flaw Exposed Customer Data For 11 Months

Hardware maker Acer has admitted its e-commerce site has suffered a security breach, and warns that customers may have had their information stolen because of the unauthorised access, according to Softpedia.

The Taiwanese company admitted in a notification to US law enforcement that users who visited the site between May 12 2015 and April 28 2016 are at risk, with customer names, addresses, and payment card details potentially accessed by hackers.

Acer has not revealed how many users were affected, but alerted the California Attorney General’s Office of a data breach as per US law. It is not yet known if customers from other countries were affected.

Risk

Acer has failed to make an official statement about the breach, leaving potentially thousands of customers at risk.

In the draft letter to customers, seen by Softpedia, Acer vice president Mark Groveunder said:

“We recently identified a security issue involving the information of certain customers who used our e-commerce site between May 12, 2015 and April 28, 2016, which resulted in unauthorized access by a third party

“Safeguarding your personal information is important to us.

“We took immediate steps to remediate this security issue upon identifying it, and we are being assisted by outside cybersecurity experts.

“We value the trust you place in us. We regret this incident occurred, and we will be working hard to enhance our security.”

Card expiration dates and three digit security codes may have also been leaked, admits the letter.

‘Nothing new’

TechWeekEurope has contacted Acer for more information, but the company had not responded at the time of publication.

Javvad Malik, security advocate at AlienVault, said that breaches like this are, unfortunately, not something new.

“The nature of business today is that organisations rely on many partners and suppliers to provide services to their customers. However, this supply chain needs to be managed and secured appropriately,” he said.

“Attackers will choose the path of least resistance to get into a company – and if it is well-secured, then this path will usually be through a third party that has legitimate access.”

Take our data breach quiz here!

Ben Sullivan

Ben covers web and technology giants such as Google, Amazon, and Microsoft and their impact on the cloud computing industry, whilst also writing about data centre players and their increasing importance in Europe. He also covers future technologies such as drones, aerospace, science, and the effect of technology on the environment.

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

36 mins ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

3 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

4 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

5 hours ago