Investigate security technology
PIN number - Personal Identification Number. It is a numeric password shared between a user and a system, that can be used to verify the user to the system.
Legislation - The act of making or enacting laws.
Biometric scanners - Biometric are methods of recognizing a person based on a physiological or behavioral characteristic like finger print.
Encryption - This is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.
Forensic computing - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
Chick-Fil-A (fast food restaurant) got exposed
KrebsOnSecurity first began hearing from banks about possible compromised payment systems at Chick-fil-A establishments in November, but the reports were spotty at best. Then, just before Christmas, one of the major credit card associations issued an alert to several financial institutions about a breach at an unnamed retailer that lasted between Dec. 2, 2013 and Sept. 30, 2014.