Skip to content
Chicago Tribune
PUBLISHED: | UPDATED:
Getting your Trinity Audio player ready...

<!– STARTER CSS
WRAP it all in a

background page color is #FBFCFC
–>

div#content.article .graphic-wrapper h2,
.graphic-wrapper img {max-width:100%;padding-top:20px;}
.graphic-wrapper img.wrap {max-width:100%;
padding-bottom:20px; float:left; margin-right:20px;
}
a.credit{font-style:italic}
.graphic-wrapper p{font-weight:normal;}
.graphic-wrapper h1{font-size: 40px;line-height: 1.3em;margin: 10px 0;}
.graphic-wrapper strong {color:#000}

/* Put a

on your charts*/
.graphic-wrapper .legend p{font-family:’Arial’, sans-serif; font-size:14px; color:#000;line-height:1.3em;margin:0;padding:0;}
ul.key li{display: inline;margin-right: 28px;font-family: ‘Arial’,sans-serif;color: #000;font-size: 13px;}

/* A will draw a colored box for use in a color key. You will need to write a second class to set the color so it matches the chart/map/etc. */
.box{display: inline-block;background-color: #000;height: 10px;width: 10px;margin: 0 5px 0 0px;}

.clearfix{clear:both}

/* REMOVE HEIGHT and WIDTH attributes from fusion tables and replace with class=’fusion-table’ */
.fusion-table{width:100%;height:400px;margin:15px 0;}

/* USE AN

in “.graphic-wrapper” for chart labels */
.graphic-wrapper h4{color:#000;font-family:’Arial’, sans-serif;font-weight:bold;font-size:16px}

/* USE AN inside the

for normal-weight italic type */
.graphic-wrapper h4 em{font-weight:normal;}

/* TABLE STYLES — just be sure

is in “.graphic-wrapper” */
.graphic-wrapper table {width:100%;margin:15px 0;border-collapse:collapse;}
.graphic-wrapper table thead tr {background-color:#12182d;color:#fff;}
.graphic-wrapper table tbody tr {vertical-align: top;}
.graphic-wrapper table td,.graphic-wrapper table th{font-size:14px; font-family:’Arial’, sans-serif;}
.graphic-wrapper table td {padding:7px;}
.graphic-wrapper table tbody tr:first-child td {padding-top:12px;}
.graphic-wrapper table th {padding:10px;border-right: 1px solid white;
text-align: left;}

.graphic-wrapper table tr:last-child{ border-bottom: 2px solid #12182d;}
.graphic-wrapper table tr:last-child td{ padding-top: 10px; padding-bottom:10px;}

/* TABLE ZEBRA STRIPES — use

*/
.graphic-wrapper table.zebra td {padding:10px 7px;}
.graphic-wrapper table.zebra tr:nth-child(even) {background: #d3deea}

.show-phone{display:none;}

/* YOUR NEW STYLES HERE */

@media all and (max-width: 700px) {

.show-phone{display:initial;}
.hide-phone{display:none;}

/* THIS IS WHERE PHONE-SPECIFIC STYLES GO */

}

Several retailers and restaurants have reported large-scale data breaches in 2014, some of which began as early as May 2013. In the largest, at Target and Home Depot, tens of millions of credit and debit cards may have been compromised. Most companies have offered affected customers free credit monitoring services for up to a year after a breach.

 Dairy Queen logo

  • How information was stolen: A third-party vendor’s compromised account credentials were used to get into Dairy Queen’s systems.
  • When breach occurred: Various times from Aug. 5-Aug. 31
  • Date reported: October 10, 2014
  • Affected: Names, numbers and expiration dates of customer payment cards at 395 of its 4,500 U.S. locations

 Jewel Osco logo

  • How information was stolen: Malware may have captured account numbers, expiration dates, other numerical information and cardholders’ name. Social Security numbers and birthdates were not captured.
  • When breach occurred: Late August or early Sept.
  • Date reported: September 29, 2014
  • Affected: Undetermined

 Jimmy Johns logo

  • How information was stolen: An intruder stole login credentials to remotely access cash register systems according to Jimmy John’s.
  • When breach occurred: Various times from June 16-Sept. 5
  • Date reported: September 24, 2014
  • Affected: Credit and debit card data at 216 U.S. stores.

 Home Depot logo

  • How information was stolen: Malware breached its payment terminals potentially impacting customers using payment cards at its U.S. and Canadian stores. There was no evidence that the breach had impacted stores in Mexico or customers who shopped on its website, according to the company.
  • When breach occurred: Beginning in April
  • Date reported: September 8, 2014
  • Affected: An estimated 56 million payment cards could be at risk.

 Jewel Osco

  • How information was stolen: Jewel-Osco computers, containing customer credit and debit card information, were hacked but there is no evidence that any data had been misued.
  • When breach occurred: Between June 22 and July 17
  • Date reported: August 14, 2014
  • Affected: Undetermined

 P.F. Chang"s logo

  • How information was stolen: P.F. Chang’s was vague on the details at first, and said that the card processing system had been compromised.
  • When breach occurred: Oct. 19, 2013-June 11, 2014
  • Date reported: August 4, 2014
  • Affected: Undetermined

 Michaels logo

  • How information was stolen: Criminals targeted the point-of-sale machines at hundreds of Michaels stores and 54 Aaron Brothers stores.
  • When breach occurred: May 8, 2013-Jan. 27, 2014
  • Date reported: April 18, 2014
  • Affected: 3 million accounts at hundreds of stores in the U.S.

 Neiman Marcus logo

  • How information was stolen: Malicious software was installed to scrape payment card information from in-store transactions.
  • When breach occurred: July 16-Oct. 30, 2013
  • Date reported: January 23, 2014
  • Affected: 1.1 million accounts in the U.S.

 Target logo

  • How information was stolen: Target didn’t say how hackers gained access. But data included credit and debit card numbers, expiration dates, security codes and PINs from cards used in Target stores.
  • When breach occurred: Nov. 27-Dec. 15, 2013
  • Date reported: December 18, 2013
  • Affected: About 40 million accounts nationally

Sources:
Tribune reporting

@ChiTribGraphics