educational

Software Standards and Vulnerabilities

The adult industry was among the early adopters of that 1990's technology craze called the Internet and in the almost 19 years since Tim Berners-Lee sent the first WWW communication, the online adult industry has seen a lot of changes. The adult industry has been on the cutting edge of many of the technologies that are today commonplace; things like streaming video, active server pages and content on demand are just a few that come to mind.

For many years there was a certain uneasy understanding between the hacker community and many adult content providers. Our worst concern generally was a user posting his log-on credentials and having a flood of nonpaying users spider our sites and vacuum up megabytes of our content. To prove the point of this strange alliance I offer the following example.

I was recently at a conference where I met the owner of a credit card payment program. He bragged to me how they challenged the hacking community to find the weaknesses in their software, which some hackers promptly did. The hackers infiltrated into the very heart of this payment system and left their "calling card." The business owner then offered to pay them to tighten the security of his software.

Am I the only one who sees a problem with this? Do you REALLY want to give unnamed hackers from unknown foreign countries with questionable motives the keys to your kingdom?

The final irony is that I was a PCI auditor at the time and this business owner lectured me on what his rights were and which regulations he had to follow. I wonder if he has a better awareness now of what data breaches are and whether or not he is still in business.

The moral of this story is that we must all be extremely careful about what software we use on our websites. The sites are our livelihood and protecting them should be something that we give more than just passing thought to.

Fortunately the online industry has matured to the point where there are many different choices for payment processing and the PCI DSS folks have provided a link for users to check to see if their PCI software is compliant.

But payment processing is only one of many pieces of software that run on web servers. A typical server will have a database (housing pictures, videos and audio), another database with current users and their passwords (and perhaps even more information about them), a streaming video server (or service) and web traffic analytical software, to mention only a few.

I suggest that everyone running a website take a moment to check their software and see if it shows up on watch lists of products with problems. You can do this online by typing in the name of the software you are investigating. This site will give you a list of vulnerabilities that exist (if any) and how dangerous they are.

If your software yields results that you don't understand or if the software has vulnerabilities that make you uncomfortable, call you computer security expert.

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Understanding the FTC's New 'Click to Cancel' Rule

The Federal Trade Commission’s new “Click to Cancel” rule has been a hot topic in consumer protection and business regulation. Part of a broader effort to streamline cancellation processes for subscription services, the rule has sparked significant debate and legal challenges.

Corey D. Silverstein ·
opinion

Key Factors for Choosing a Merchant Services Partner

Running a successful adult business requires more than just delivering alluring and cutting-edge products and services. Securing the right payment processing partner is essential to maintaining a steady revenue stream.

Jonathan Corona ·
opinion

Identifying and Preventing Transaction Laundering

Recently, a few merchants approached me after receiving compliance notifications from their acquirer about transaction laundering. They were unsure what it meant, and unsure how to identify and fix the problem.

Cathy Beardsley ·
profile

WIA: Alexis Fawx Levels Up as Multifaceted Entrepreneur

As more performers look to diversify, expanding their range of revenue streams and promotional vehicles, some are spreading their entrepreneurial wings to create new businesses — including Alexis Fawx.

Women In Adult ·
opinion

Navigating Age-Related Regulations in Europe

Age verification measures are rapidly gaining momentum across Europe, with regulators stepping up efforts to protect children online. Recently, the U.K.’s communications regulator, Ofcom, updated its timeline for implementing the Online Safety Act, while France’s ARCOM has released technical guidance detailing age verification standards.

Gavin Worrall ·
opinion

Why Cyber Insurance Is Crucial for Adult Businesses

From streaming services and interactive platforms to ecommerce and virtual reality experiences, the adult industry has long stood at the forefront of online innovation. However, the same technology-forward approach that has enabled adult businesses to deliver unique and personalized content to consumers worldwide also exposes them to myriad risks.

Corey D. Silverstein ·
opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
Show More