Risk
7/31/2007
12:25 PM
50%
50%

Logic Intros Smart-TPS Payment Page

Secure transaction payment specialist The Logic Group launches Smart-TPS Payment Page, a secure, hosted online trading facility

FLEET, U.K. -- Secure transaction payment specialist The Logic Group, today launched Smart-TPS Payment Page; a secure, hosted online trading facility. Smart-TPS Payment Page will provide new and existing Smart-TPS users, with a secure and cost effective means to trade online.

Delivered as a fully managed service, Smart-TPS Payment Page will enable merchants to accept sales from the internet, securely, 24/7. As an extension to its’ Smart-TPS service, which has gained rapid popularity since launch earlier this year, The Logic Group will host customer facing web payment pages and securely process resulting transactions.

The Smart-TPS Payment Page is hosted in The Logic Group’s fully PCI compliant secure data centres. As part of the service all online transactions are checked against a Verified by VisaTM and MasterCard SecureCodeTM payer authentication system, thereby offering a further level of protection against fraudulent transactions.

“Smart-TPS Payment Page is a quick, easy and secure way for merchants to trade online and meet the new 3D Secure Payer Authentication requirements,” said Mark McMurtrie, Marketing Director at The Logic Group. “Smart-TPS users can enjoy all the benefits of a fully encompassing managed service across multiple sales channels.”

The Logic Group Enterprises Ltd.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.