summaryrefslogtreecommitdiff
path: root/financial-news.html
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2016-10-15 12:14:55 +0200
committerChristian Grothoff <christian@grothoff.org>2016-10-15 12:14:55 +0200
commit0a9286e8ef449d924397c2f39568cb18c89e758e (patch)
tree96f59e8c6eaa49f18230e09e169c7db625d2873b /financial-news.html
parent4cb1dff4025241e061f5d68e4ade9c27f4e99894 (diff)
downloadwww-0a9286e8ef449d924397c2f39568cb18c89e758e.tar.gz
www-0a9286e8ef449d924397c2f39568cb18c89e758e.tar.bz2
www-0a9286e8ef449d924397c2f39568cb18c89e758e.zip
add link to online skimming article
Diffstat (limited to 'financial-news.html')
-rw-r--r--financial-news.html12
1 files changed, 11 insertions, 1 deletions
diff --git a/financial-news.html b/financial-news.html
index 9d0922a0..5bb4d628 100644
--- a/financial-news.html
+++ b/financial-news.html
@@ -15,13 +15,23 @@
<div class="row">
<div class="col-lg-12">
+ <h2>15-10-2016: Thousands of online stores found skimming</h2>
+ <p>Security researchers found evidence of adversaries targeting online shops offering credit cards
+ to steal and resell credit card credentials.<br>
+ With GNU Taler, shops would never receive sensitive personal information such as credit cards,
+ thus hacked online shops would not create such hassles for consumers.
+ </p>
+ <p><a class="btn btn-info" href="https://gwillem.gitlab.io/2016/10/11/5900-online-stores-found-skimming/" role="button">Source</a></p>
+ </div>
+
+ <div class="col-lg-12">
<h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2>
<p>Security researchers found serious security flaws in the German &quot;electronic cash&quot; system
which enable criminals to withdraw funds from merchant accounts based on the information printed
on receipts and other information obtained from public sources or point-of-sales terminals purchased
online.<br>
The German &quot;electronic cash&quot; system is based on the &quot;Poseidon&quot; protocol, for
- which there is no publicly accessible specification or reference implementation. This has allowed
+ which there is no publicly accessible specification or reference implementation. This has allowed
such major security holes to persist for decades.
</p>
<p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p>