diff options
author | Christian Grothoff <christian@grothoff.org> | 2016-10-15 12:14:55 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2016-10-15 12:14:55 +0200 |
commit | 0a9286e8ef449d924397c2f39568cb18c89e758e (patch) | |
tree | 96f59e8c6eaa49f18230e09e169c7db625d2873b /financial-news.html | |
parent | 4cb1dff4025241e061f5d68e4ade9c27f4e99894 (diff) | |
download | www-0a9286e8ef449d924397c2f39568cb18c89e758e.tar.gz www-0a9286e8ef449d924397c2f39568cb18c89e758e.tar.bz2 www-0a9286e8ef449d924397c2f39568cb18c89e758e.zip |
add link to online skimming article
Diffstat (limited to 'financial-news.html')
-rw-r--r-- | financial-news.html | 12 |
1 files changed, 11 insertions, 1 deletions
diff --git a/financial-news.html b/financial-news.html index 9d0922a0..5bb4d628 100644 --- a/financial-news.html +++ b/financial-news.html @@ -15,13 +15,23 @@ <div class="row"> <div class="col-lg-12"> + <h2>15-10-2016: Thousands of online stores found skimming</h2> + <p>Security researchers found evidence of adversaries targeting online shops offering credit cards + to steal and resell credit card credentials.<br> + With GNU Taler, shops would never receive sensitive personal information such as credit cards, + thus hacked online shops would not create such hassles for consumers. + </p> + <p><a class="btn btn-info" href="https://gwillem.gitlab.io/2016/10/11/5900-online-stores-found-skimming/" role="button">Source</a></p> + </div> + + <div class="col-lg-12"> <h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2> <p>Security researchers found serious security flaws in the German "electronic cash" system which enable criminals to withdraw funds from merchant accounts based on the information printed on receipts and other information obtained from public sources or point-of-sales terminals purchased online.<br> The German "electronic cash" system is based on the "Poseidon" protocol, for - which there is no publicly accessible specification or reference implementation. This has allowed + which there is no publicly accessible specification or reference implementation. This has allowed such major security holes to persist for decades. </p> <p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p> |