Original release date: January 02, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of...
Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the...
caas
cashier-as-a-service
distributed systems
dynamic analysis
e-commerce
fraudprevention
information security
logic flaws
merchant websites
merchants
online shopping
payment methods
payment processing
research
security flaw
security policies
static analysis
third party services
web security
xiaofeng wang
Amazon retailers are being targeted by fraudsters who have created a custom-built a program that generates fakes receipts for nonexistent orders, according to researchers from GFI Software.
he program is designed to create a customized HTML file that closely resembles an actual Amazon.com...