Adobe says attack exposed customer financial info | Inquirer Technology
Close  

Adobe says attack exposed customer financial info

/ 07:59 PM October 04, 2013

Adobe Systems Inc. said a cyberattack on its systems has exposed credit-card information of 2.9 million customers.

The maker of Photoshop and other software said Thursday that the attacker accessed Adobe customer IDs and passwords on its systems. Through that, they were able to remove customer names, encrypted credit and debit card numbers, expiration dates and other information related to orders from customers worldwide. The company does not believe attackers removed credit and debit card numbers that weren’t encrypted.

ADVERTISEMENT

Adobe is notifying customers and resetting passwords. It has alerted banks processing Adobe payments to help protect customer accounts. It is also working with federal law enforcement on its related investigation.

“Cyber attacks are one of the unfortunate realities of doing business today,” Brad Arkin, Adobe’s chief security officer, wrote in a blog post Thursday. “Given the profile and widespread use of many of our products, Adobe has attracted increasing attention from cyber attackers.”

FEATURED STORIES

The San Jose, California, company says it is also investigating illegal access to the source code of numerous Adobe products and believes the attacks are related.

Adobe shares fell 64 cents to close at $50.88 Thursday and were unchanged in after-hours trading.

TOPICS: Adobe, cyberattack, Cybercrime, Photoshop
Read Next
Don't miss out on the latest news and information.

Subscribe to INQUIRER PLUS to get access to The Philippine Daily Inquirer & other 70+ titles, share up to 5 gadgets, listen to the news, download as early as 4am & share articles on social media. Call 896 6000.

For feedback, complaints, or inquiries, contact us.


© Copyright 1997-2021 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.