Pizza Hut Australia Website Hackers Gained Access to Customer Information
By Jenalyn Villamarin | November 10, 2012 12:10 AM EST
The famous pizza restaurant chain, Pizza Hut, reported a website-hacking incident where customer's names, email addresses and contact information were leaked. Despite Pizza Hut's claims that the customer's credit card information was not affected, the unpleasant incident should serve as a lesson for the business to keep strict protection of its personal and financial records.
"Pizza Hut can confirm that a layer of its website, pizzahut.com.au, was breached with access gained to names and contact information, including email addresses," Graeme Houston, Pizza Hut General Manager, said in a statement released to technology websites ZDNet and Gizmodo.
Houston did not reveal how many customers' information was leaked and who was responsible for the heinous crime. "We are working with our website providers to conduct a thorough investigation of the matter and have also reported the incident to the Office of the Australian Information Commissioner. We would like to reassure all of our customers that absolutely no credit card information was stolen and there is no need for concern regarding credit cards," Houston declared.
Also, Houston guaranteed the customers that the security of Pizza Hut's online ordering system has not been corrupted in any manner. "Our customers can continue to order online in the knowledge the ordering system is secure," Houston further confirmed.
Experts claimed that credit card information should be stored separately at all times. This is a very serious issue since some businesses involved in website hacking made the mistake of combining the two databases.
Over the past couple of years, Australian businesses have already suffered numerous personal information leaks like AAPT, Distribute.IT and Lush. Last year, Sony and Nintendo also suffered embarrassment from a massive data leak. According to experts, it is necessary for businesses to exert time and effort in finding the source of the leak rather than just restoring files or information from a back-up.
To contact the editor, e-mail:
Most Popular Slideshows
Join the Conversation
- 2014 Meteor Shower: Slooh To Have Live Broadcast Of Orionids Meteor Shower October 21 Peak, NASA Assures Ideal Observing Conditions
- Kate Middleton Makes First Public Appearance, Sickness Seems Over
- Kate Middleton To Give Birth To A 'Cheerful' Baby, Duchess Not Carrying Twins---Report
- Woman Stuck In Chimney: Genoveva Nunez-Figueroa Arrested For Attempted Break-In After Rescue Team Pulls Stuck Woman Out Of Chimney
- 63-Year-Old Admits He Has Made Love To More Than 700 Cars But Now Remains Faithful To Just One Beetle
- Chilling: New ISIS Video Addresses Australia; Aussie Teen Delivers Message
- The Pirate Bay Blockade: Cost Of Blocking Websites Like TPB Is Ridiculously High
- Xiaomi Mi4 And MiPad Prices Likely Slashed, Thanks To Rivals Oppo, OnePlus And Meizu
- Top 4 Free-To-Download Apps for Fuller iPhone 6, 6 Plus Experience
- Battery Saving Android 5.0 Lollipop Feature Extends The Battery Life Of Your Android Device By 90 Minutes And Displays Orange Bar While Power Saving Mode Is On
- Virginia Woman Who Posted Naked Image Of Ex-BF’s New Partner 1st Person Charged Under Revenge Porn Law
- Australia's 'No Way' Anti-Asylum Seeker Poster Sparks Outrage