Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Microsoft wants you to chat with its browser now – but can you trust this Copilot?

      July 28, 2025

      I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)

      July 28, 2025

      I’m a Linux pro – here are my top 5 command line backup tools for desktops and servers

      July 28, 2025

      Should you buy a refurbished iPad? I tried one from Back Market and here’s my verdict

      July 28, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      elegantweb/sanitizer

      July 28, 2025
      Recent

      elegantweb/sanitizer

      July 28, 2025

      Streamlined String Encryption with Laravel’s Fluent Methods

      July 28, 2025

      Resume PHP

      July 28, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025
      Recent

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025

      New Xbox games launching this week, from July 28 through August 3 — Grounded 2 arrives on Xbox Game Pass

      July 28, 2025

      TikTok’s owner forked Microsoft’s Visual Studio Code and concerns have been raised — reports suggest it’s resource heavy and never stops ‘phoning home’

      July 28, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Credit Card Sins

    Credit Card Sins

    June 11, 2025

    Our anonymous submitter, whom we’ll call Carmen, embarked on her IT career with an up-and-coming firm that developed and managed eCommerce websites for their clients. After her new boss Russell walked her around the small office and introduced her to a handful of coworkers, he led her back to his desk to discuss her first project. Carmen brought her laptop along and sat down across from Russell, poised to take notes.

    Russell explained that their newest client, Sharon, taught CPR classes. She wanted her customers to be able to pay and sign up for classes online. She also wanted the ability to charge customers a fee in case they cancelled on her.

    Digital River ePassporte bank card. Kuala Lumpur, Malaysia.

    “You’re gonna build a static site to handle all this,” he said.

    Carmen nodded along as she typed out notes in a text file.

    “Now, Sharon doesn’t want to pay more than a few hundred dollars for the site,” Russell continued, “so we’re not gonna hook up an endpoint to use a service-provided API for payments.”

    Carmen glanced up from her laptop, perplexed. “How are we gonna do it, then?”

    “Via email,” Russell replied smoothly. “The customer will enter their CC info into basic form fields. When they click Submit, you’re gonna send all that to Sharon’s business address, and also CC it to yourself for backup and recovery purposes.”

    Carmen’s jaw dropped. “Just … straight-up email raw credit card data?”

    “Yep!” Russell replied. “Sharon knows to expect the emails.”

    Her heart racing with panic, Carmen desperately cast about for some way for this to be less awful. “Couldn’t … couldn’t we at least encrypt the CC info before we send it to her?”

    “She’s not paying us for that,” Russell dismissed. “This’ll be easier to implement, anyway! You can handle it, can’t you?”

    “Yyyes—”

    “Great! Go get started, let me know if you have any more questions.”

    Carmen had plenty of questions and even more misgivings, but she’d clearly be wasting her time if she tried to bring them up. There was no higher boss to appeal to, no coworkers she knew well enough who could slip an alternate suggestion into Russell’s ear on her behalf. She had no choice but to swallow her good intentions and implement it exactly the way Russell wanted it. Carmen set up the copied emails to forward automatically to a special folder so that she’d never have to look at them. She cringed every time a new one came in, reflecting on how lucky Sharon and her customers were that the woman supporting her website had a conscience.

    And then one day, a thought came to Carmen that really scared her: in how many places, in how many unbelievable ways, was her sensitive data being treated like this?

    Eventually, Carmen moved on to bigger and better things. Her first project most likely rests in the hands of Russell’s newest hire. We can only hope it’s an honest hire.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleInsyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware
    Next Article Ubuntu 25.10 “Questing Quokka”: Rimozione della Sessione GNOME su Xorg (X11)

    Related Posts

    News & Updates

    Microsoft wants you to chat with its browser now – but can you trust this Copilot?

    July 28, 2025
    News & Updates

    I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)

    July 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The Witcher 3 celebrates its 10th anniversary, and it’s still one of my favorite games of all time

    News & Updates

    CVE-2022-21200 – Apache HTTP Server Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-45953 – PHPGurukul Hostel Management System Session Hijacking

    Common Vulnerabilities and Exposures (CVEs)

    The Bitter End: Unraveling Eight Years of Espionage Antics—Part One

    Security

    Highlights

    CVE-2025-37996 – KVM arm64 Uninitialized Pointer Vulnerability

    May 29, 2025

    CVE ID : CVE-2025-37996

    Published : May 29, 2025, 2:15 p.m. | 2 hours, 47 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    KVM: arm64: Fix uninitialized memcache pointer in user_mem_abort()

    Commit fce886a60207 (“KVM: arm64: Plumb the pKVM MMU in KVM”) made the
    initialization of the local memcache variable in user_mem_abort()
    conditional, leaving a codepath where it is used uninitialized via
    kvm_pgtable_stage2_map().

    This can fail on any path that requires a stage-2 allocation
    without transition via a permission fault or dirty logging.

    Fix this by making sure that memcache is always valid.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Lwan is an experimental, scalable, high performance HTTP server

    June 25, 2025

    So, You’re Going to Dreamforce 2025? Here’s Everything You Need to Know

    July 1, 2025

    Splitcat – split and merge files

    June 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.