Barnes and Noble warns of stolen credit card data

A Barnes and Noble store in Washington DC 30 April 2012

Related Stories

The largest US bookseller, Barnes and Noble, says shoppers may have had credit card data stolen after keypads in 63 stores were tampered with.

The chain said that a "sophisticated criminal effort" had planted bugs on one pad in each store.

By 14 September, Barnes and Noble had disconnected all keypads in its almost 700 stores.

The firm says purchases made on its website and on Nook, its e-reader device, were not affected.

An anonymous Barnes and Noble official told the New York Times that it did not immediately alert customers, at the request of US investigators.

The FBI had asked the book store not to make any announcement until the agency could determine who was behind the attacks.

Unauthorised purchases were made on some credit cards in September, according to the New York Times.

Barnes and Noble said it was continuing to work with the investigation and recommended that customers change their card Pin numbers.

The stores affected were in the states of California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania and Rhode Island, according to a Barnes and Noble press release.

More on This Story

Related Stories

More US & Canada stories

RSS

Features

  • Alana Saarinen at pianoMum, Dad and Mum

    The girl with three biological parents


  • Polish and British flags alongside British roadsideWar debt

    Does the UK still feel a sense of obligation towards Poles?


  • Islamic State fighters parade in Raqqa, Syria (30 June 2014)Who backs IS?

    Where Islamic State finds support to become a formidable force


  • Bride and groom-to-be photographed underwaterWetted bliss

    Chinese couples told to smile, but please hold your breath


  • A ship is dismantled for scrap in the port city of Chittagong, BangladeshDangerous work

    Bangladesh's ship breakers face economic challenge


BBC © 2014 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.