ICO to investigate Tesco over website security concerns

Privacy watchdog to look at retailer’s website security after expert highlights concerns.

Tesco website

The Information Commissioner's Office (ICO) is to investigate a number of security issues surrounding supermarket giant Tesco's customer website.

A couple of weeks ago, security researcher Troy Hunt pointed out in a blog that he received a password reminder from Tesco that contained his password in plain text.

Hunt told the BBC that this showed Tesco's password data was not being securely stored. A more secure way of storing passwords would be to send users details on how to reset a password rather than sending the password itself in plain text.

The researcher also said that the retailer should use HTTPS across the entire site in order to protect customers from phishing and other attacks.

Although HTTPS is used on some part of the website, it isn't in others and Hunt said this does not assure customers using the site.

"HTTP is stateless so the only (practical) way a state, such as being logged in, can be persisted is by passing cookies backwards and forwards between the browser and the website," he said.

"Because they're being sent over a HTTP connection, anyone who can watch the traffic can see those same cookies. And copy them. And hijack your session."

The allegations surrounding the debacle have become serious enough for the ICO to launch an inquiry into the retailer's security measures. A spokesman for the ICO told IT Pro that investigations into the problem were at an "early stage".

"We are aware of these issues and will be making enquiries," said the spokesman.

Tesco responded with a statement saying: "We know how important internet security is to customers and the measures we have are robust. We are never complacent and work continuously to give customers the confidence that they can shop securely."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

New DNS vulnerabilities put millions of IoT devices at risk of hacking
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk of hacking

13 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO
5G

5G will accelerate cyber crime, predicts former White House CIO

13 Apr 2021
How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021