taler-www

Main taler.net website
Log | Files | Refs | Submodules | README | LICENSE

commit 0a9286e8ef449d924397c2f39568cb18c89e758e
parent 4cb1dff4025241e061f5d68e4ade9c27f4e99894
Author: Christian Grothoff <christian@grothoff.org>
Date:   Sat, 15 Oct 2016 12:14:55 +0200

add link to online skimming article

Diffstat:
Mfinancial-news.html | 12+++++++++++-
1 file changed, 11 insertions(+), 1 deletion(-)

diff --git a/financial-news.html b/financial-news.html @@ -15,13 +15,23 @@ <div class="row"> <div class="col-lg-12"> + <h2>15-10-2016: Thousands of online stores found skimming</h2> + <p>Security researchers found evidence of adversaries targeting online shops offering credit cards + to steal and resell credit card credentials.<br> + With GNU Taler, shops would never receive sensitive personal information such as credit cards, + thus hacked online shops would not create such hassles for consumers. + </p> + <p><a class="btn btn-info" href="https://gwillem.gitlab.io/2016/10/11/5900-online-stores-found-skimming/" role="button">Source</a></p> + </div> + + <div class="col-lg-12"> <h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2> <p>Security researchers found serious security flaws in the German &quot;electronic cash&quot; system which enable criminals to withdraw funds from merchant accounts based on the information printed on receipts and other information obtained from public sources or point-of-sales terminals purchased online.<br> The German &quot;electronic cash&quot; system is based on the &quot;Poseidon&quot; protocol, for - which there is no publicly accessible specification or reference implementation. This has allowed + which there is no publicly accessible specification or reference implementation. This has allowed such major security holes to persist for decades. </p> <p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p>