Skip to main content

Acer hit with $115K in penalties after the theft of 35,000 users' personal information

acer settlement security breach logo
Image used with permission by copyright holder
In June 2016, Acer announced that a security breach pertaining to its online storefront serving North America had resulted in thousands of users’ personal data being compromised. Now, the New York attorney general’s office has confirmed that the company will pay $115,000 in penalties, following an in-depth investigation into the error.

It’s been discovered that an Acer employee enabled debugging mode on the company’s ecommerce platform between July 2015 and April 2016, according to a report from Engadget. This setting caused all personal data provided by customers via web forms to be saved to an unencrypted, plain-text log file.

The information offered up included full names, credit card numbers, expiration dates, verification numbers, user names and passwords for the site, email addresses, and full street addresses including ZIP codes. Customers would obviously need to submit this data to carry out a transaction on the website, but it’s easy to imagine how malicious entities could use it to commit acts of fraud.

Furthermore, there’s confirmation that the Acer website was misconfigured such that unauthorized users could browse its directory. Attackers could access subdirectories from a web browser, according to a release published by the attorney general’s office.

The investigation has found that 35,000 users based in the United States, Canada, and Puerto Rico had their information stolen as a result of the breach. At least one hacking group has been confirmed to have exploited the site’s vulnerabilities to obtain this data between November 2015 and April 2016.

As well as the $115,000 settlement, Acer will be required to enforce several new security policies intended to ensure that these mistakes aren’t repeated. The company will have to deliver yearly employee training about data security and customer privacy, and designate a specific employee to be notified whenever customer data is stored without encryption, among a list of other stipulations.

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more