ICO to investigate Tesco over website security concerns

Privacy watchdog to look at retailer’s website security after expert highlights concerns.

Tesco website

The Information Commissioner's Office (ICO) is to investigate a number of security issues surrounding supermarket giant Tesco's customer website.

A couple of weeks ago, security researcher Troy Hunt pointed out in a blog that he received a password reminder from Tesco that contained his password in plain text.

Hunt told the BBC that this showed Tesco's password data was not being securely stored. A more secure way of storing passwords would be to send users details on how to reset a password rather than sending the password itself in plain text.

The researcher also said that the retailer should use HTTPS across the entire site in order to protect customers from phishing and other attacks.

Although HTTPS is used on some part of the website, it isn't in others and Hunt said this does not assure customers using the site.

"HTTP is stateless so the only (practical) way a state, such as being logged in, can be persisted is by passing cookies backwards and forwards between the browser and the website," he said.

"Because they're being sent over a HTTP connection, anyone who can watch the traffic can see those same cookies. And copy them. And hijack your session."

The allegations surrounding the debacle have become serious enough for the ICO to launch an inquiry into the retailer's security measures. A spokesman for the ICO told IT Pro that investigations into the problem were at an "early stage".

"We are aware of these issues and will be making enquiries," said the spokesman.

Tesco responded with a statement saying: "We know how important internet security is to customers and the measures we have are robust. We are never complacent and work continuously to give customers the confidence that they can shop securely."

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020