*IMPORTANT* NoMoreRack Security Breach!

by Super Coupon Lady on November 17, 2011 · 2 comments


Here on Super Coupon Lady, I told you about NoMoreRack and the Insanity Deals lately.  So I wanted to make sure you were aware of a breach in their security last night.   NoMoreRack has been hacked and users have been able to access other customer’s information when they log into their account. Some people were able to view personal information including name, address, phone numbers, emails and in some cases credit card numbers (but not the expiration dates and security digits).

Here’s what they wrote on their Facebook Wall,  “Hello, as valued customers, we take your privacy and ensuring the security of your data very seriously. In the middle of the night last night, our technology team was alerted to an issue involving ability to login and our login process. In order to properly diagnose the issue and continue to ensure the security of the site, on notification we disabled the checkout process. We can assure you no billing information was compromised. Nomorerack does not store any card holder data, rather card holder data is stored within a PCI compliant environment and our billing gateway. Nevertheless, our team is reviewing all accounts accessed during the period of time when the login function experienced abnormalities to ensure the integrity of each customer’s account. Please feel free to contact customer service with any questions or concerns you may have.”

If you have your Credit Card on file with NoMoreRack, I would highly suggest you contact  your bank let them know that your credit card number may be jeopardized.  They will direct you in the action you need to take.

{ 2 comments… read them below or add one }

Lillie November 17, 2011 at 11:23 am

How do we know if we were hit?


Super Coupon Lady November 17, 2011 at 11:27 am

I don’t know Lillie. I just saw this on their FB Page and wanted to make sure everyone was aware of this. I would make sure to check your bank account.


Leave a Comment

Previous post:

Next post: