by Samuel Bocetta | Last Updated Nov 10, 2019 | Published on Nov 18, 2018 | Blog
Introduction How do you protect yourself when you use PayPal? Most don’t give it a second thought, and just assume PayPal is handling all the security. However, there are many steps you can take to further ensure your safety when making purchases. In excess of...
by angelleye | Last Updated Nov 8, 2018 | Published on Nov 7, 2018 | Blog
Overview We live in an age of e-commerce. Therefore, more and more of us are turning to online retail for everything from consumer electronics to groceries and even cars. Last year, e-commerce was responsible for around $2.3 trillion in retail sales and that number is...
by Drew | Last Updated Oct 21, 2018 | Published on Jun 28, 2018 | PayPal
PayPal Security Overview As of 06/26/2018, PayPal has officially begun updating their server security to only accepts traffic requests using a specific HTTP protocol, TLS 1.2 / HTTP 1.1. Even though PayPal has been warning people about this for years now, and they...
Installation If you have not already done so, click here to obtain a copy of the free plugin. Then proceed with the installation. Manual Installation Download the plugin from your order email receipt or account history. Navigate to the Plugins page in your WordPress...
PayPal Security for WordPress is a simple tool that will scan all of your site content for HTML code that resembles PayPal Standard payment buttons. A site score will be returned as well as details about potential vulnerabilities in the individual PayPal buttons...
by Drew | Last Updated Oct 21, 2018 | Published on Dec 26, 2015 | Tutorials
PayPal provides a “Button Factory” within any PayPal business account that can be used to create basic payment buttons for PayPal. The PayPal Button Factory supports the following types of payment buttons: Shopping Cart (Add to Cart and View Cart)...
by Drew | Last Updated Nov 22, 2018 | Published on Nov 5, 2014 | Blog, WooCommerce
What is POODLE?POODLE is an internet security vulnerability that impacts the Secure Sockets Layer (SSL) 3.0 protocol, which was designed to ensure secure connections when browsing the Internet. When exploited, this vulnerability enables a cyber criminal to gain...