commit 0a9286e8ef449d924397c2f39568cb18c89e758e
parent 4cb1dff4025241e061f5d68e4ade9c27f4e99894
Author: Christian Grothoff <christian@grothoff.org>
Date: Sat, 15 Oct 2016 12:14:55 +0200
add link to online skimming article
Diffstat:
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/financial-news.html b/financial-news.html
@@ -15,13 +15,23 @@
<div class="row">
<div class="col-lg-12">
+ <h2>15-10-2016: Thousands of online stores found skimming</h2>
+ <p>Security researchers found evidence of adversaries targeting online shops offering credit cards
+ to steal and resell credit card credentials.<br>
+ With GNU Taler, shops would never receive sensitive personal information such as credit cards,
+ thus hacked online shops would not create such hassles for consumers.
+ </p>
+ <p><a class="btn btn-info" href="https://gwillem.gitlab.io/2016/10/11/5900-online-stores-found-skimming/" role="button">Source</a></p>
+ </div>
+
+ <div class="col-lg-12">
<h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2>
<p>Security researchers found serious security flaws in the German "electronic cash" system
which enable criminals to withdraw funds from merchant accounts based on the information printed
on receipts and other information obtained from public sources or point-of-sales terminals purchased
online.<br>
The German "electronic cash" system is based on the "Poseidon" protocol, for
- which there is no publicly accessible specification or reference implementation. This has allowed
+ which there is no publicly accessible specification or reference implementation. This has allowed
such major security holes to persist for decades.
</p>
<p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p>