Business & Tech

Evanston Barnes & Noble Card Readers Were Hacked

Hackers stole credit card date from 63 stores around the country by hacking into PIN pads. The Barnes & Noble at 1630 Sherman Ave. in Evanston was among the stores with breached data.

The Barnes & Noble store at 1630 Sherman Ave. in Evanston was among 63 stores around the country where credit card data stored on PIN pads was hacked, according to the company. 

Barnes & Noble released a list of stores where data was breached on Tuesday; other stores in Illinois include two in Chicago, one in Crystal Lake, on in Deer Park, one in Deerfield and one in West Dundee.

The company inspected every PIN pad in the nearly 700 stores nationwide and has discontinued use of all its PIN pads on Sept. 14, according to a press release from the bookseller. Barnes & Noble described the hacking as “a sophisticated criminal effort to steal credit card information, debit card information, and debit card PIN numbers from customers who swiped their cards through PIN pads when they made purchase.” 

Interested in local real estate?Subscribe to Patch's new newsletter to be the first to know about open houses, new listings and more.

The federal government is also investigating the crime, according to Barnes & Noble.

According to Barnes & Noble, purchases on the company’s website, on NOOKs and NOOK mobile apps remain secure.

Interested in local real estate?Subscribe to Patch's new newsletter to be the first to know about open houses, new listings and more.

Customers who swiped their cards at any of the Barnes & Noble stores affected are encouraged to change the PIN numbers on their debit cards, review their accounts for unauthorized transactions and notify banks immediately if they find anything suspicious. 

A full list of the 63 affected stores can be found on Barnes & Noble’s website.

 


Get more local news delivered straight to your inbox. Sign up for free Patch newsletters and alerts.

We’ve removed the ability to reply as we work to make improvements. Learn more here