Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 11, 2025

      Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

      June 11, 2025

      Databricks adds new tools like Lakebase, Lakeflow Designer, and Agent Bricks to better support building AI apps and agents in the enterprise

      June 11, 2025

      Zencoder launches end-to-end UI testing agent

      June 11, 2025

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025

      3 secrets of PowerToys on Windows 11 that you’ll wish you already knew

      June 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      [EcjoJS Meta] Content discussion

      June 11, 2025
      Recent

      [EcjoJS Meta] Content discussion

      June 11, 2025

      Accessibility, Inclusive Design, and Universal Design Work Together

      June 11, 2025

      An “Inconceivable” Conversation With Dr. Pete Cornwell on Simple vs. Agentic AI

      June 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025
      Recent

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Credit Card Sins

    Credit Card Sins

    June 11, 2025

    Our anonymous submitter, whom we’ll call Carmen, embarked on her IT career with an up-and-coming firm that developed and managed eCommerce websites for their clients. After her new boss Russell walked her around the small office and introduced her to a handful of coworkers, he led her back to his desk to discuss her first project. Carmen brought her laptop along and sat down across from Russell, poised to take notes.

    Russell explained that their newest client, Sharon, taught CPR classes. She wanted her customers to be able to pay and sign up for classes online. She also wanted the ability to charge customers a fee in case they cancelled on her.

    Digital River ePassporte bank card. Kuala Lumpur, Malaysia.

    “You’re gonna build a static site to handle all this,” he said.

    Carmen nodded along as she typed out notes in a text file.

    “Now, Sharon doesn’t want to pay more than a few hundred dollars for the site,” Russell continued, “so we’re not gonna hook up an endpoint to use a service-provided API for payments.”

    Carmen glanced up from her laptop, perplexed. “How are we gonna do it, then?”

    “Via email,” Russell replied smoothly. “The customer will enter their CC info into basic form fields. When they click Submit, you’re gonna send all that to Sharon’s business address, and also CC it to yourself for backup and recovery purposes.”

    Carmen’s jaw dropped. “Just … straight-up email raw credit card data?”

    “Yep!” Russell replied. “Sharon knows to expect the emails.”

    Her heart racing with panic, Carmen desperately cast about for some way for this to be less awful. “Couldn’t … couldn’t we at least encrypt the CC info before we send it to her?”

    “She’s not paying us for that,” Russell dismissed. “This’ll be easier to implement, anyway! You can handle it, can’t you?”

    “Yyyes—”

    “Great! Go get started, let me know if you have any more questions.”

    Carmen had plenty of questions and even more misgivings, but she’d clearly be wasting her time if she tried to bring them up. There was no higher boss to appeal to, no coworkers she knew well enough who could slip an alternate suggestion into Russell’s ear on her behalf. She had no choice but to swallow her good intentions and implement it exactly the way Russell wanted it. Carmen set up the copied emails to forward automatically to a special folder so that she’d never have to look at them. She cringed every time a new one came in, reflecting on how lucky Sharon and her customers were that the woman supporting her website had a conscience.

    And then one day, a thought came to Carmen that really scared her: in how many places, in how many unbelievable ways, was her sensitive data being treated like this?

    Eventually, Carmen moved on to bigger and better things. Her first project most likely rests in the hands of Russell’s newest hire. We can only hope it’s an honest hire.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read MoreÂ

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleInsyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware
    Next Article Ubuntu 25.10 “Questing Quokka”: Rimozione della Sessione GNOME su Xorg (X11)

    Related Posts

    News & Updates

    OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

    June 11, 2025
    News & Updates

    Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

    June 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5178 – Realce Tecnologia Queue Ticket Kiosk Unrestricted File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47948 – Cocotais Bot Privileged Command Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5632 – Content-Management-System News-Buzz SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)
    Rilasciato DeaDBeeF 1.10: Un veterano del software libero che continua a evolversi

    Rilasciato DeaDBeeF 1.10: Un veterano del software libero che continua a evolversi

    Linux

    Highlights

    Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents

    April 23, 2025

    Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents

    Security researchers at Fortinet’s FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized Microsoft Word documents to deliver information-stealing malware to unsuspectin …
    Read more

    Published Date:
    Apr 23, 2025 (4 hours, 3 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2017-11882

    The best Vizio TVs of 2025: Expert recommended

    April 11, 2025

    CVE-2025-3704 – DBAR Productions Volunteer Sign Up Sheets Stored Cross-site Scripting

    May 27, 2025
    Malware Open Source nei Pacchetti Software: la Nuova Minaccia per le Distribuzioni GNU/Linux

    Malware Open Source nei Pacchetti Software: la Nuova Minaccia per le Distribuzioni GNU/Linux

    April 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.