DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Starbucks mobile app hacked? No, says Starbucks.

Posted on May 15, 2015 by Dissent

I had held off reporting a scam involving Starbucks mobile app, and I’m glad I did, because Starbucks says there’s been no compromise of their app or system. In a statement on their site, they write:

Starbucks takes the obligation to protect customers’ information seriously. News reports that the Starbucks mobile app has been hacked are false.

Like all major retailers, the company has safeguards in place to constantly monitor for fraudulent activity and works closely with financial institutions. To protect the integrity of these security measures, Starbucks will not disclose specific details but can assure customers their security is incredibly important and all concerns related to customer security are taken seriously.

Occasionally, Starbucks receives reports from customers of unauthorized activity on their online account. This is primarily caused when criminals obtain reused names and passwords from other sites and attempt to apply that information to Starbucks. To protect their security, customers are encouraged to use different user names and passwords for different sites, especially those that keep financial information.

If a customer believes their account has been subject to fraudulent activity, they are encouraged to contact both Starbucks and their financial institution immediately. Customers are not responsible for charges or transfers they did not make. If a customer’s Starbucks Card is registered, their account balance is protected.

For additional security, Starbucks encourages customers to employ several best practices to ensure information is as protected as possible, such as:

Passwords

Creating passwords made up of long phrases or sentences that mix capital and lowercase letters, numbers, and symbols.

Using different passwords for different sites, especially those that keep financial information.

Changing passwords often.

Lost or Stolen Device

If a customer believes their device has been lost or stolen, immediately change passwords for financial and personal accounts to prevent any identity theft or fraud.

Stay Alert

Regularly review bank statements for suspicious activity. If something is in error, immediately report that to your financial institution.

If you see any suspicious activity on your Starbucks Card or mobile app, please immediately notify Starbucks customer service at 1-800-STARBUC.

Of course, customers who have been burned and the media have now associated the problem with Starbucks and Starbucks’ infosecurity. So are they getting bad press and a bad rep for something that is the customers’ responsibility (not re-using login credentials)? Or could one argue that in this day and age, when so many login credentials have been stolen, Starbucks and every other firm should have stronger authentication or defenses against this type of thing?

If buying a cup of coffee leaves a bad taste in your mouth because of this type of problem, will you be so quick to buy the next one?


Related:

  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Gov't seeks police probe of KT for allegedly obstructing data breach investigation
  • Oracle silently fixes zero-day exploit leaked by ShinyHunters
  • Discord blamed a vendor for its data breach — now the vendor says it was ‘not hacked’
Category: Business Sector

Post navigation

← FL: Personal information, FBI report left in scrapped cop car
Ca: Four hospital clerks caught snooping in patient files →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.