Language Selection

English French German Italian Portuguese Spanish

Amazon tightens rules for sellers

Filed under
Web
Fraud by third-party merchants could hurt brand integrity, some experts say

John Wocher bought the camera of his dreams from a seller on Amazon.com with nary a second thought, gleefully anticipating its arrival after wiring $4,549 to zShop merchant awesomediscount.com in January.

As February approached, Wocher stepped up the frequency of his e-mails with the seller, asking for the UPS tracking number, his concern growing after he had so amicably arranged the wire transfer from his home in Japan.

This was a civilized transaction, after all, conducted under the auspices of the King of Internet retailing.

But when Wocher e-mailed the seller once again to ask for the shipment's tracking number, he learned there was no longer such a user. An attempted visit to awesomediscount.com found that the Web site no longer existed.

Wocher had been duped. And while Amazon has since refunded his full price and changed its zShop policies to prevent such problems, some zShop merchants continue to violate the company's new rules, exposing consumers to the same sort of fraud.

Some experts say that the risk goes beyond the consumer to imperil Amazon's brand integrity as well, as reflected by the company's falling customer satisfaction ratings.
It took Wocher more than a month of indignant e-mails to Amazon's customer service department to achieve a resolution. It came the same day Amazon changed its policies to cap zShop and Auction sales at $2,475.

Under that new policy, all purchases made through Auctions and zShops must be made via Amazon Payments, assuring the coverage of many of the site's third-party transactions by the company's A-to-Z guarantee, which promises up to a $2,500 refund on a purchase gone wrong.

Full Story.

More in Tux Machines

Mastodon 2.0

About 6 months have passed since April, during which the major mainstream breakthrough of our decentralized social network took place. From 20,000 users to almost a million! What better time to run through a couple examples of what’s been introduced since then? Mastodon is defined by its focus on good user experience, polished design and superior anti-abuse tools. In that vein, the web app has received numerous updates. Using the latest browser features, the web app receives real push notifications, making it almost indistinguishable from a native mobile app. It works faster and looks smoother thanks to many performance and design improvements. Read more

Red Hat: Satellite, OpenShift, Government, SoftBank

  • A Red Hat Satellite tutorial to install an update server
    Is server patch management the best part of your job? Stop reading here. Many IT organizations struggle with OS patching processes. For Red Hat administrators who are willing to invest some initial energy to simplify later tasks, Satellite provides infrastructure lifecycle management, including capabilities for provisioning, reporting and configuration management. To this end, follow this Red Hat Satellite tutorial to set up a simple server for updates. Once we review how to install the basic update server, we'll create one example client.
  • Red Hat updates Gluster storage for OpenShift container apps
    Red Hat bolstered Gluster storage for its OpenShift Container Platform, adding iSCSI block and S3 object interfaces, as well as greater persistent volume density.
  • Red Hat to Cover Open Source Collaboration at Gov’t Symposium; Paul Smith Comments
    Red Hat (NYSE: RHT) is set to hold its annual symposium on federal information technology on Nov. 9 where the company will host discussions on open source collaboration and its potential benefits for government, GovCon Executive reported Oct. 11.
  • Red Hat’s Container Technologies and Knowledge Were Chosen by SoftBank to Embrace DevOps
    Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that several of Red Hat’s open source technologies, including Red Hat OpenShift Container Platform, as well as the knowledge of Red Hat Consulting, were chosen by SoftBank Corp (“SoftBank”), a subsidiary of SoftBank Group Corp., to implement DevOps methodology for its Service Platform Division, IT Service Development Division, Information Technology Unit, and Technology Unit, the company’s in-house IT organization. This large, varied organization develops, maintains and operates SoftBank’s IT systems for internal work and operations, supporting 600 diverse systems.
  • Form 4 RED HAT INC For: Oct 17 Filed by: Kelly Michael A
  • Taking a Fresh Look at Red Hat, Inc. (RHT)

Security: Google Play, WPA2, FERC, HackerOne

  • 8 'Minecraft' apps infected with Sockbot malware on Google Play found adding devices to botnet

    Security researchers have discovered that at least eight malware-laced apps on Google Play Store are ensnaring devices to a botnet to potentially carry out distributed denial-of-service (DDoS) and other malicious attacks. These apps claimed to provide skins to tweak the look of characters in the popular Minecraft: Pocket Edition game and have been downloaded as many as 2.6 million times.

  • KRACK Vulnerability: What You Need To Know
    This week security researchers announced a newly discovered vulnerability dubbed KRACK, which affects several common security protocols for Wi-Fi, including WPA (Wireless Protected Access) and WPA2. This is a bad vulnerability in that it likely affects billions of devices, many of which are hard to patch and will remain vulnerable for a long time. Yet in light of the sometimes overblown media coverage, it’s important to keep the impact of KRACK in perspective: KRACK does not affect HTTPS traffic, and KRACK’s discovery does not mean all Wi-Fi networks are under attack. For most people, the sanest thing to do is simply continue using wireless Internet access.
  • FERC sets rules to protect grid from malware spread through laptops
    The Federal Energy Regulatory Commission on Thursday proposed new mandatory cybersecurity controls to protect the utility system from the threat posed by laptops and other mobile devices that could spread malicious software. The standards are meant to "further enhance the reliability and resilience of the nation's bulk electric system" by preventing malware from infecting utility networks and bringing down the power grid, according to the nation's grid regulator.
  • Hack These Apps And Earn $1,000 — Bug Bounty Program Launched By Google And HackerOne
  • Security Vulnerability Puts Linux Kernel at Risk

Smartphone Waste and Tizen News