Play.com leaks customer data

Powered by SC Magazine
 

Online retailer's marketing firm makes customers targets for phishers.

Play.com has admitted a security breach has leaked customer details.

The online retailer emailed customers last night, warning that its marketing company had suffered a security breach.

"Unfortunately this has meant that some customer names and email addresses may have been compromised," the email said.

"Please be assured this issue has occurred outside of Play.com and no other personal customer information has been involved," it added.

Play.com advised users to be "vigilant" with their email, and asked users to forward "anything suspicious" to privacy@play.com for investigation.

The email list is apparently already being used to target customers with phishing scams, according to reports in forums.

Update: A spokesman for Play.com said the breach only leaked email addresses, not credit cards, addresses, or passwords, which were held separately from marketing data.

"We believe this issue may be related to some irregular activity that was identified in December 2010 at our email service provider, Silverpop," CEO John Perkins said in a statement. "Investigations at the time showed no evidence that any of our customer email addresses had been downloaded."

"Play.com has taken all the necessary steps with Silverpop to ensure a security breach of this nature does not happen again," he added.

This article originally appeared at pcpro.co.uk

Copyright © PC Pro, Dennis Publishing


Play.com leaks customer data
 
 
 
Top Stories
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Images: the next frontier in data analytics?
Barclay’s global data chief says we’re still at the starting line.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  26%
TOTAL VOTES: 431

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 206

Vote