Is this Paypal Github SDK reference really a dangerous site?In this instance, is code+security code really...
What can I do if someone tampers with my SSH public key?
What does "rhumatis" mean?
How does learning spells work when leveling a multiclass character?
Is every open circuit a capacitor?
Was it really inappropriate to write a pull request for the company I interviewed with?
Problems with rounding giving too many digits
The need of reserving one's ability in job interviews
Practical reasons to have both a large police force and bounty hunting network?
Giving a talk in my old university, how prominently should I tell students my salary?
PTIJ: Aliyot for the deceased
How does a sound wave propagate?
Is there a math expression equivalent to the conditional ternary operator?
Why is there an extra space when I type "ls" on the Desktop?
Different Account page layouts, what are they?
Why would the IRS ask for birth certificates or even audit a small tax return?
Is this lemma equivalent to the axiom of choice?
newcommand: Using one parameter as the default for the other
The (Easy) Road to Code
When to use the term transposed instead of modulation?
Why would /etc/passwd be used every time someone executes `ls -l` command?
Is "cogitate" an appropriate word for this?
Deal the cards to the players
How do we objectively assess if a dialogue sounds unnatural or cringy?
Under what conditions would I NOT add my Proficiency Bonus to a Spell Attack Roll (or Saving Throw DC)?
Is this Paypal Github SDK reference really a dangerous site?
In this instance, is code+security code really more secure than just a longer code?This site uses a weak security configuration - SHA-1 signaturesIs it dangerous to interrupt session on a web-site?Firefox presenting a Deceptive Site warning when trying to download a popular github resource. Should I ignore it?
I'm working on integrating a payment system with paypal in C#, and I installed the official paypal nuget package. Then I went to the paypal github site.
And linked to this below site (SDK Reference).
At this point both Chrome and Firefox warned me about
Deceptive Site Ahead
Is this site really dangerous?
URL's are listed here so that people don't need to click on potentially dangerous links:
https://github.com/paypal/PayPal-NET-SDK
http://paypal.github.io/PayPal-NET-SDK/Samples/PaymentWithPayPal.aspx.html
web-browser credit-card account-security
add a comment |
I'm working on integrating a payment system with paypal in C#, and I installed the official paypal nuget package. Then I went to the paypal github site.
And linked to this below site (SDK Reference).
At this point both Chrome and Firefox warned me about
Deceptive Site Ahead
Is this site really dangerous?
URL's are listed here so that people don't need to click on potentially dangerous links:
https://github.com/paypal/PayPal-NET-SDK
http://paypal.github.io/PayPal-NET-SDK/Samples/PaymentWithPayPal.aspx.html
web-browser credit-card account-security
add a comment |
I'm working on integrating a payment system with paypal in C#, and I installed the official paypal nuget package. Then I went to the paypal github site.
And linked to this below site (SDK Reference).
At this point both Chrome and Firefox warned me about
Deceptive Site Ahead
Is this site really dangerous?
URL's are listed here so that people don't need to click on potentially dangerous links:
https://github.com/paypal/PayPal-NET-SDK
http://paypal.github.io/PayPal-NET-SDK/Samples/PaymentWithPayPal.aspx.html
web-browser credit-card account-security
I'm working on integrating a payment system with paypal in C#, and I installed the official paypal nuget package. Then I went to the paypal github site.
And linked to this below site (SDK Reference).
At this point both Chrome and Firefox warned me about
Deceptive Site Ahead
Is this site really dangerous?
URL's are listed here so that people don't need to click on potentially dangerous links:
https://github.com/paypal/PayPal-NET-SDK
http://paypal.github.io/PayPal-NET-SDK/Samples/PaymentWithPayPal.aspx.html
web-browser credit-card account-security
web-browser credit-card account-security
edited 1 hour ago
user230910
asked 2 hours ago
user230910user230910
1255
1255
add a comment |
add a comment |
2 Answers
2
active
oldest
votes
No, it's not dangerous at all. Your browser is warning you because a non-Paypal website has Paypal in its name. This is a common technique used by phishing sites that attempt to fool you into thinking the site is official. For example, a website might be called paypal.secure1234.com
and made to look like the official site, enticing you to trust it and input your sensitive credentials. The browser has no way of knowing that the site you are visiting has Paypal in its name for completely benign reasons.
add a comment |
This is a typical false positive. Since Firefox is using Google safe browsing API, so it will show similar warning as in Chrome browser. Since some antivirus also use the API, it will be warned by those antivirus as well.
Here is the Google safe browsing transparency report. Somebody need to file an incorrect phishing warning to google to remove the incorrect warning.
For antivirus/security services, the false positive problem can be cascade by Google safe browsing and each other detection algorithm. If you put the URL into virustotal, you will see a possibly detection compound problem, e.g. A see B,C,D services detect the URL, so it also assume the URL is bad.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "162"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f205009%2fis-this-paypal-github-sdk-reference-really-a-dangerous-site%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
No, it's not dangerous at all. Your browser is warning you because a non-Paypal website has Paypal in its name. This is a common technique used by phishing sites that attempt to fool you into thinking the site is official. For example, a website might be called paypal.secure1234.com
and made to look like the official site, enticing you to trust it and input your sensitive credentials. The browser has no way of knowing that the site you are visiting has Paypal in its name for completely benign reasons.
add a comment |
No, it's not dangerous at all. Your browser is warning you because a non-Paypal website has Paypal in its name. This is a common technique used by phishing sites that attempt to fool you into thinking the site is official. For example, a website might be called paypal.secure1234.com
and made to look like the official site, enticing you to trust it and input your sensitive credentials. The browser has no way of knowing that the site you are visiting has Paypal in its name for completely benign reasons.
add a comment |
No, it's not dangerous at all. Your browser is warning you because a non-Paypal website has Paypal in its name. This is a common technique used by phishing sites that attempt to fool you into thinking the site is official. For example, a website might be called paypal.secure1234.com
and made to look like the official site, enticing you to trust it and input your sensitive credentials. The browser has no way of knowing that the site you are visiting has Paypal in its name for completely benign reasons.
No, it's not dangerous at all. Your browser is warning you because a non-Paypal website has Paypal in its name. This is a common technique used by phishing sites that attempt to fool you into thinking the site is official. For example, a website might be called paypal.secure1234.com
and made to look like the official site, enticing you to trust it and input your sensitive credentials. The browser has no way of knowing that the site you are visiting has Paypal in its name for completely benign reasons.
edited 1 hour ago
answered 2 hours ago
forestforest
37.5k17120134
37.5k17120134
add a comment |
add a comment |
This is a typical false positive. Since Firefox is using Google safe browsing API, so it will show similar warning as in Chrome browser. Since some antivirus also use the API, it will be warned by those antivirus as well.
Here is the Google safe browsing transparency report. Somebody need to file an incorrect phishing warning to google to remove the incorrect warning.
For antivirus/security services, the false positive problem can be cascade by Google safe browsing and each other detection algorithm. If you put the URL into virustotal, you will see a possibly detection compound problem, e.g. A see B,C,D services detect the URL, so it also assume the URL is bad.
add a comment |
This is a typical false positive. Since Firefox is using Google safe browsing API, so it will show similar warning as in Chrome browser. Since some antivirus also use the API, it will be warned by those antivirus as well.
Here is the Google safe browsing transparency report. Somebody need to file an incorrect phishing warning to google to remove the incorrect warning.
For antivirus/security services, the false positive problem can be cascade by Google safe browsing and each other detection algorithm. If you put the URL into virustotal, you will see a possibly detection compound problem, e.g. A see B,C,D services detect the URL, so it also assume the URL is bad.
add a comment |
This is a typical false positive. Since Firefox is using Google safe browsing API, so it will show similar warning as in Chrome browser. Since some antivirus also use the API, it will be warned by those antivirus as well.
Here is the Google safe browsing transparency report. Somebody need to file an incorrect phishing warning to google to remove the incorrect warning.
For antivirus/security services, the false positive problem can be cascade by Google safe browsing and each other detection algorithm. If you put the URL into virustotal, you will see a possibly detection compound problem, e.g. A see B,C,D services detect the URL, so it also assume the URL is bad.
This is a typical false positive. Since Firefox is using Google safe browsing API, so it will show similar warning as in Chrome browser. Since some antivirus also use the API, it will be warned by those antivirus as well.
Here is the Google safe browsing transparency report. Somebody need to file an incorrect phishing warning to google to remove the incorrect warning.
For antivirus/security services, the false positive problem can be cascade by Google safe browsing and each other detection algorithm. If you put the URL into virustotal, you will see a possibly detection compound problem, e.g. A see B,C,D services detect the URL, so it also assume the URL is bad.
edited 31 mins ago
answered 59 mins ago
mootmootmootmoot
1,574413
1,574413
add a comment |
add a comment |
Thanks for contributing an answer to Information Security Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f205009%2fis-this-paypal-github-sdk-reference-really-a-dangerous-site%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown