Feeds

Website shares user credit cards with world+dog

Blippy's overexposure

Top 5 reasons to deploy VMware with Tegile

A website that encourages people to share details of their online purchases with world+dog was caught exposing the complete credit card numbers of four of its users.

Blippy is one of the more glaring examples of the ill-conceived social exhibitionist craze sweeping the web. On Friday, its users got a taste of that fad's dark side when simple Google searches turned up 127 transactions that included the credit card numbers.

Blippy quickly apologized for the snafu and said it resulted from glitch that dated back to the website's beta testing. User profiles are supposed to be scrubbed of the corresponding credit card details so they show only the merchant and the dollar amount spent. But during testing, some of that information remained in the HTML code and was only discovered using Google.

Google said it removed the card numbers from searches a little more than two hours after it learned of the problem. Blippy officials were in the process of reaching the four individuals whose numbers were exposed. ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.