Feeds

Online payment standards fall on deaf websites

Beware of Belgians bearing card codes

Using blade systems to cut costs and sharpen efficiencies

We see a lot of lip service paid to the importance of complying with payment card industry standards when merchants accept credit and debit cards. But it seems plenty of websites still can't be bothered to follow the rules, which are designed to protect their customers against fraud and identity theft.

Just last week, Reg reader Martti Ylioja spotted Belgium-based Tele Ticket Service retaining most of his credit-card details, including the "CCV2" verification code that is coveted by criminal carders.

"When you log into the site the next time its still all in there - a bit dangerous practice," he wrote. He included the screenshot below to show us what he saw several days after surrendering his credit card info to the site.

Such practice is a violation of section 3.2.2 of the PCI rules, said Tom Arnold, a member of PSC, which provides consulting for companies that accept electronic payments. "To store [the CCVC2] and remember it and keep it on file is a big-time violation," he said.

The PCI standards are designed to prevent the kind of credit card heists that befell TJX after it improperly stored huge amounts of credit card data. Merchants found flouting the rules can be forced to pay penalties in some cases. We emailed representatives at Tele Ticket Service but never got a response.

Ylioja was understandably concerned about his data being stored and was unable to figure out how to remove the data from the site other then overwriting it with bogus information. And even that wasn't easy.

Screenshot of website storing credit card details

"Interestingly, I had to generate a fictitious Visa card number with a correct check sum to get it replaced," he said. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.