e-Mail Database Hacked: Kroger, Walgreens, & Target

by Beth Montgomery on April 6, 2011 · 0 comments

in Announcements, Store Deals, Target

target deals

If you haven’t received your notice yet, you will soon.   A large e-mail marketing provider was recently hacked, taking e-mail addresses from the databases of many high-profile companies.   While no personal information, such as your credit card, passwords, or address were compromised, you may see an increase in spam.

Companies effected include Target, 1-800-Flowers, Kroger, TiVo, JP Morgan, Capital One, Walgreens, Marriot Hotels, Hilton Hotels, New York & Company, Home Shopping Network, Dillons, Citi, bebe, Fry’s, Ethan Allen, Eddie Bauer, Verizon, and many more.

Just a friendly reminder:

  • Never open e-mails from anyone you don’t know.
  • Never click suspicious links in e-mails.
  • Don’t provide sensitive information via e-mail or through insecure website. If you are contacted and told you need to update your information with your PayPal account, don’t click the link in the e-mail.   Instead, open your browser and type the address.   You’ll most likely find that the e-mail was a scam and no update is needed.
  • Pay attention to sender’s e-mail address. Spammers, scammers, and hackers are smart, so be smarter.   Companies have their own domain names and e-mail addresses from these domain names.   Target will contact you though an address like newsletter@target.com or admin@target.com.   Don’t fall for e-mail addresses such as target@gmail.com and even e-mail addresses like admin@target-stores.com.

Have any other tips to avoid spammers, scammers, and hackers via e-mail?

Read Target 101: What You Need to Know to Save to find ways to save more money at Target!   Plus, check out more deal at Target and more store deals.

  • Like on FaceBook
  • Pin It
  • Print Friendly and PDF

Enjoy this deal? Sign up for more!


Subscribe to our FREE deals newsletter to get great deals by email daily and never miss a deal!
More Options

Leave a Comment

Previous post:

Next post: