aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--financial-news.html12
1 files changed, 11 insertions, 1 deletions
diff --git a/financial-news.html b/financial-news.html
index 9d0922a0..5bb4d628 100644
--- a/financial-news.html
+++ b/financial-news.html
@@ -15,13 +15,23 @@
15 <div class="row"> 15 <div class="row">
16 16
17 <div class="col-lg-12"> 17 <div class="col-lg-12">
18 <h2>15-10-2016: Thousands of online stores found skimming</h2>
19 <p>Security researchers found evidence of adversaries targeting online shops offering credit cards
20 to steal and resell credit card credentials.<br>
21 With GNU Taler, shops would never receive sensitive personal information such as credit cards,
22 thus hacked online shops would not create such hassles for consumers.
23 </p>
24 <p><a class="btn btn-info" href="https://gwillem.gitlab.io/2016/10/11/5900-online-stores-found-skimming/" role="button">Source</a></p>
25 </div>
26
27 <div class="col-lg-12">
18 <h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2> 28 <h2>22-12-2015: Sicherheitsforscher hacken das EC-Bezahlsystem</h2>
19 <p>Security researchers found serious security flaws in the German &quot;electronic cash&quot; system 29 <p>Security researchers found serious security flaws in the German &quot;electronic cash&quot; system
20 which enable criminals to withdraw funds from merchant accounts based on the information printed 30 which enable criminals to withdraw funds from merchant accounts based on the information printed
21 on receipts and other information obtained from public sources or point-of-sales terminals purchased 31 on receipts and other information obtained from public sources or point-of-sales terminals purchased
22 online.<br> 32 online.<br>
23 The German &quot;electronic cash&quot; system is based on the &quot;Poseidon&quot; protocol, for 33 The German &quot;electronic cash&quot; system is based on the &quot;Poseidon&quot; protocol, for
24 which there is no publicly accessible specification or reference implementation. This has allowed 34 which there is no publicly accessible specification or reference implementation. This has allowed
25 such major security holes to persist for decades. 35 such major security holes to persist for decades.
26 </p> 36 </p>
27 <p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p> 37 <p><a class="btn btn-info" href="http://www.zeit.de/digital/datenschutz/2015-12/electronic-cash-bezahlsystem-terminals-gehackt" role="button">Source</a></p>