Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      Honeycomb launches AI observability suite for developers

      September 13, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Distribution Release: Q4OS 6.1

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Optimizely Mission Control – Part III

      September 14, 2025
      Recent

      Optimizely Mission Control – Part III

      September 14, 2025

      Learning from PHP Log to File Example

      September 13, 2025

      Online EMI Calculator using PHP – Calculate Loan EMI, Interest, and Amortization Schedule

      September 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
      Recent

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025

      Dmitry — The Deep Magic

      September 13, 2025

      Right way to record and share our Terminal sessions

      September 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Credit Card Sins

    Credit Card Sins

    June 11, 2025

    Our anonymous submitter, whom we’ll call Carmen, embarked on her IT career with an up-and-coming firm that developed and managed eCommerce websites for their clients. After her new boss Russell walked her around the small office and introduced her to a handful of coworkers, he led her back to his desk to discuss her first project. Carmen brought her laptop along and sat down across from Russell, poised to take notes.

    Russell explained that their newest client, Sharon, taught CPR classes. She wanted her customers to be able to pay and sign up for classes online. She also wanted the ability to charge customers a fee in case they cancelled on her.

    Digital River ePassporte bank card. Kuala Lumpur, Malaysia.

    “You’re gonna build a static site to handle all this,” he said.

    Carmen nodded along as she typed out notes in a text file.

    “Now, Sharon doesn’t want to pay more than a few hundred dollars for the site,” Russell continued, “so we’re not gonna hook up an endpoint to use a service-provided API for payments.”

    Carmen glanced up from her laptop, perplexed. “How are we gonna do it, then?”

    “Via email,” Russell replied smoothly. “The customer will enter their CC info into basic form fields. When they click Submit, you’re gonna send all that to Sharon’s business address, and also CC it to yourself for backup and recovery purposes.”

    Carmen’s jaw dropped. “Just … straight-up email raw credit card data?”

    “Yep!” Russell replied. “Sharon knows to expect the emails.”

    Her heart racing with panic, Carmen desperately cast about for some way for this to be less awful. “Couldn’t … couldn’t we at least encrypt the CC info before we send it to her?”

    “She’s not paying us for that,” Russell dismissed. “This’ll be easier to implement, anyway! You can handle it, can’t you?”

    “Yyyes—”

    “Great! Go get started, let me know if you have any more questions.”

    Carmen had plenty of questions and even more misgivings, but she’d clearly be wasting her time if she tried to bring them up. There was no higher boss to appeal to, no coworkers she knew well enough who could slip an alternate suggestion into Russell’s ear on her behalf. She had no choice but to swallow her good intentions and implement it exactly the way Russell wanted it. Carmen set up the copied emails to forward automatically to a special folder so that she’d never have to look at them. She cringed every time a new one came in, reflecting on how lucky Sharon and her customers were that the woman supporting her website had a conscience.

    And then one day, a thought came to Carmen that really scared her: in how many places, in how many unbelievable ways, was her sensitive data being treated like this?

    Eventually, Carmen moved on to bigger and better things. Her first project most likely rests in the hands of Russell’s newest hire. We can only hope it’s an honest hire.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleInsyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware
    Next Article Ubuntu 25.10 “Questing Quokka”: Rimozione della Sessione GNOME su Xorg (X11)

    Related Posts

    News & Updates

    Building personal apps with open source and AI

    September 12, 2025
    News & Updates

    What Can We Actually Do With corner-shape?

    September 12, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-8576 – “Google Chrome Extensions Use After Free Heap Corruption Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Tech Behind the Trucks: AI, GPS & Automation in Online Truck Booking Explained

    Web Development

    CVE-2025-49275 – Blogbyte PHP Remote File Inclusion Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Here are two key changes announced for next-nen Windows 11’s hardware drivers

    Operating Systems

    Highlights

    Artificial Intelligence

    Using generative AI, researchers design compounds that can kill drug-resistant bacteria

    August 14, 2025

    With help from artificial intelligence, MIT researchers have designed novel antibiotics that can combat two…

    Red Hat Enterprise Linux (RHEL) quietly released an official image for WSL — but most of us won’t be able to use it

    June 25, 2025

    This MagSafe accessory just duped the most premium wallet I’ve tried for $30

    June 16, 2025

    MSI Claw 8 AI+ now has a special edition, and another handheld leaked — But it’s already hard enough getting these devices

    May 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.