Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Credit Card Sins

    Credit Card Sins

    June 11, 2025

    Our anonymous submitter, whom we’ll call Carmen, embarked on her IT career with an up-and-coming firm that developed and managed eCommerce websites for their clients. After her new boss Russell walked her around the small office and introduced her to a handful of coworkers, he led her back to his desk to discuss her first project. Carmen brought her laptop along and sat down across from Russell, poised to take notes.

    Russell explained that their newest client, Sharon, taught CPR classes. She wanted her customers to be able to pay and sign up for classes online. She also wanted the ability to charge customers a fee in case they cancelled on her.

    Digital River ePassporte bank card. Kuala Lumpur, Malaysia.

    “You’re gonna build a static site to handle all this,” he said.

    Carmen nodded along as she typed out notes in a text file.

    “Now, Sharon doesn’t want to pay more than a few hundred dollars for the site,” Russell continued, “so we’re not gonna hook up an endpoint to use a service-provided API for payments.”

    Carmen glanced up from her laptop, perplexed. “How are we gonna do it, then?”

    “Via email,” Russell replied smoothly. “The customer will enter their CC info into basic form fields. When they click Submit, you’re gonna send all that to Sharon’s business address, and also CC it to yourself for backup and recovery purposes.”

    Carmen’s jaw dropped. “Just … straight-up email raw credit card data?”

    “Yep!” Russell replied. “Sharon knows to expect the emails.”

    Her heart racing with panic, Carmen desperately cast about for some way for this to be less awful. “Couldn’t … couldn’t we at least encrypt the CC info before we send it to her?”

    “She’s not paying us for that,” Russell dismissed. “This’ll be easier to implement, anyway! You can handle it, can’t you?”

    “Yyyes—”

    “Great! Go get started, let me know if you have any more questions.”

    Carmen had plenty of questions and even more misgivings, but she’d clearly be wasting her time if she tried to bring them up. There was no higher boss to appeal to, no coworkers she knew well enough who could slip an alternate suggestion into Russell’s ear on her behalf. She had no choice but to swallow her good intentions and implement it exactly the way Russell wanted it. Carmen set up the copied emails to forward automatically to a special folder so that she’d never have to look at them. She cringed every time a new one came in, reflecting on how lucky Sharon and her customers were that the woman supporting her website had a conscience.

    And then one day, a thought came to Carmen that really scared her: in how many places, in how many unbelievable ways, was her sensitive data being treated like this?

    Eventually, Carmen moved on to bigger and better things. Her first project most likely rests in the hands of Russell’s newest hire. We can only hope it’s an honest hire.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleInsyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware
    Next Article Ubuntu 25.10 “Questing Quokka”: Rimozione della Sessione GNOME su Xorg (X11)

    Related Posts

    News & Updates

    The best CRM software with email marketing in 2025: Expert tested and reviewed

    July 22, 2025
    News & Updates

    This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-43697 – Salesforce OmniStudio DataMapper Permission Preservation Encryption Exposure Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-32815 – Infoblox NETMRI Authentication Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Build a conversational data assistant, Part 2 – Embedding generative business intelligence with Amazon Q in QuickSight

    Machine Learning

    CVE-2025-52207 – MikoPBX PHP File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Linux

    Rilasciata postmarketOS 25.06: la distribuzione GNU/Linux per dispositivi mobili introduce il supporto a nuovi dispositivi e systemd

    June 23, 2025

    postmarketOS è una distribuzione GNU/Linux progettata specificamente per dispositivi mobili, con l’obiettivo di estendere la…

    VS meldt actief misbruik van beveiligingslek in wifi-routers TP-Link

    June 17, 2025

    I tested the Hexgears DeathStrike GK760 mechanical keyboard, and it has one tremendous downside

    April 23, 2025

    CVE-2025-4973 – Workreap WordPress Theme Authentication Bypass Vulnerability

    June 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.