Join The Discussion

 

Group buys former Armour meatpacking site in Stockyards

The 16.8-acre site of the historic, former Armour meatpacking plant in Fort Worth’s Stockyards has changed hands, and its new owners aren’t saying anything about their plans. Chesapeake Land Development Co., which bought the site

read more >

Hulen Pointe Shopping Center sold

Hulen Pointe Shopping Center, located in southwest Fort Worth on South Hulen Street one mile south of Hulen Mall, has been purchased by Addison-based Bo Avery with TriMarsh Properties for an undisclosed price.

read more >

Dallas-Fort Worth in top five commercial real estate markets in 2015

According to the Emerging Trends in Real Estate 2015 report, just co-published by PwC US and the Urban Land Institute (ULI), Dallas-Fort Worth ranks No. 5, with two other Texas cities, Houston and Austin ranking at No. 1 and 2 respectively. San Francisco ranks No. 3 and Denver No. 4.

read more >

Social House Fort Worth plans to open mid-November

Social House has leased 5,045 square feet at 2801-2873 W Seventh St. in Fort Worth, according to Xceligent Inc.

read more >

Fort Worth temporarily stops issuing new home permits in TCU area

The moratorium will give a committee and the City Council time to review a proposed overlay that will pare the number of permissible unrelated adults living in the same house.

read more >

UPS says 51 retail stores, including some in Texas, breached by malware


DAVID KOENIG, AP Business Writer

Some customers of The UPS Store may have had their credit and debit card information exposed by a computer virus found on systems at 51 stores in 24 states.

A spokeswoman for UPS says the information includes names, card numbers and postal and email addresses from about 100,000 transactions between Jan. 20 and Aug. 11.

United Parcel Service Inc. said Wednesday that it was among U.S. retailers who got a Department of Homeland Security bulletin about the malware on July 31. The malware is not identified by current anti-virus software.

The company is not aware of any fraud related to the attack, spokeswoman Chelsea Lee said.

Atlanta-based UPS said it hired a security firm that found the virus in systems at about 1 percent of the company's 4,470 franchised locations. At many stores, the intrusion did not begin until March or April.

Lee said that the problem was fixed by Aug. 11 and the company took additional steps to protect systems at other stores. She said the affected stores were not linked electronically, and UPS is still investigating how they were compromised.

UPS said it is providing identity protection and credit monitoring help to affected customers.

The affected stores were in Arizona, California, Colorado, Connecticut, Florida, Georgia, Idaho, Illinois, Louisiana, Maryland, Nebraska, Nevada, New Jersey, New York, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, South Dakota, Tennessee, Texas, Virginia and Washington.

From the company's description, the breach appeared far smaller than one that hit Target Corp. during the holiday-shopping season, when hackers stole credit and debit card information involving millions of customers. Fallout from the incident is still hurting profits. Target, which said Wednesday that second-quarter profit fell 62 percent, has spent $235 million related to the breach, partly offset by $90 million in insurance payments.

The UPS breach won't have a material financial impact on the company, Lee said.

Last week, Supervalu said that hackers might have stolen names, account numbers, expiration dates and other information from card holders who shopped at up to 200 of its grocery and liquor stores. Restaurant operator P.F. Chang's, Goodwill thrift stores and other retailers have been hit by data breaches.

A list of the 51 locations of The UPS Store where malware was discovered is at www.theupsstore.com/security

 

 

 

 

< back

Email   email
hide
Ebola
How worried are you about Ebola spreading?