Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com
SingleHop PCI Cloud Hosting


Attract, Retain and Delight More Customers
Close more deals in less time, track your sales activities and access customer data from your mobile device. Grow your business with Zoho CRM.
Sign up now for a free 15-day trial.

Identity Fraud, Part 3: Taking the Target Off Your Back
September 30, 2008
If you've become a victim of identity theft, there are steps you can take to restore your good name, wipe black marks off your credit report, and recoup virtually all, if not absolutely all, of the money fraudulently spent under your name. So, how do you prevent this from happening again?
Identity Fraud, Part 2: Digging Yourself Out of the Wreckage
September 29, 2008
So it's happened. Someone's stolen your identity and now you've got a collection agency on your case, demanding payment for a car you didn't buy or a credit card you didn't take out. What to do? The first thing is not to panic, said Jay Foley, executive director of the Identity Theft Resource Center.
Identity Fraud, Part 1: A $45 Billion Snowball
September 27, 2008
Imagine getting a $45 billion bill without knowing exactly how you ended up with such a big tab. That's exactly the situation facing Americans struck by identity fraud. In 2007, the misuse of lost and stolen identity information cost $45 billion, an average of $5,574 per incident, according to Javelin Strategy's 2008 Identity Fraud Survey Report.
New PCI Security Standard Falls Short
September 24, 2008
October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -- much hype has surrounded each PCI update.
Ninja Assassins, E-Mail Hackers and a Digital Media Pile-On
September 19, 2008
If you're a ninja assassin, a terrorist, an illegal street racer, or any other variety of violent outlaw, you shouldn't look to YouTube for training anymore; you won't find any there. The Google-owned video sharing site has revised its policies to specifically forbid such videos.
What Palin's Hacked E-Mail Reveals: System Insecurity
September 18, 2008
Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business as governor of Alaska, had been hacked by activists associated with the group Anonymous.
New PCI Security Standards: Lock It Down, Lock It Tight
September 02, 2008
The Payment Card Industry regulation changes that take affect Oct. 1 will mean some additional work by IT departments -- and some new spending. But the PCI Data Security Standard version 1.2 will allow the Payment Card Industry a phase-in period to meet the new rules, according to two security firms that provide compliance tools.
Coming Soon: New ID Security Rules
August 22, 2008
Six federal banking regulators, including the U.S. Federal Reserve, FDIC and Office of Thrift Supervision, last November issued final rules clarifying what U.S. banks and credit institutions would have to do to comply with Red Flag provisions of the 2003 Fair and Accurate Credit Transaction Act.
Feds Throw Book at 11 Customer Data Theft Suspects
August 06, 2008
The Department of Justice has charged 11 people with the theft of millions of account numbers from a long list of U.S. big box retailers including TJ Maxx, OfficeMax, Barnes & Noble, Boston Market, BJ's Wholesale Club, Forever 21, DSW, Dave & Buster's and Sports Authority.
PGP CEO Dunkelberger on Research, Learning and Carlos Castaneda
July 30, 2008
Heading the company with perhaps the most recognized acronym in the information security field and following in the footsteps of lightning-rod figure Phil Zimmerman must have both its charms and its challenges. PGP CEO Phil Dunkelberger, however, ranges far and wide in his reflections on how data -- and keeping it safe -- affects our lives and our thinking.
Bigger Phishers to Fry, Part 2: The Phuture of Phishing
July 14, 2008
If one were to look for sure bets in the online world, phishing would be right up there on the growing list of security concerns. The art of phishing has been a remarkable study in technology innovation. It started as a simple means of luring unsuspecting consumers to visit bogus Web sites to capture basic credit card information.
Bigger Phishers to Fry, Part 1: Calling the Pros
July 07, 2008
It's been on the radar of USA Credit Union's IT department for three years. They all knew about it. They were watching it every day. They had also heard rumblings that more and more of their industry counterparts had fallen victim to the attackers, said Daniel Schneider, the credit union's senior manager of IT. Phishing was definitely moving downstream.
Teen Hacker Could Get 38-Year Sentence for Fixing Grades
June 19, 2008
Two Orange County, Calif., teens have been charged with breaking into their school late at night and using stolen log-ins to hack into its computer system and change their grades. Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 69 felony counts including altering a public record, identity theft and burglary.
What's Bugging E-Tail Security?
May 30, 2008
Software security breaches add up in recent headlines alone: $13 million in losses; 45.6 million credit cards stolen; recovery costs at $256 million dollars and mounting; and companies driven into bankruptcy or out of business. Financially motivated targeted attacks are becoming more prevalent, and new vulnerabilities continue to be reported, according to industry research firm Gartner.
DOJ Busts Up Global Phishing Ring, Charges 38
May 19, 2008
Law enforcement authorities in two countries on Monday charged 38 people in the U.S. and Romania with taking part in two different phishing-related fraud schemes that authorities say were tied to organized crime worldwide. The U.S. Department of Justice and the Prosecutor General of Romania announced the charges Monday.
Passwords Aren't Enough: 3 Ways to Bolster User Authentication
May 15, 2008
Many organizations are decreasing their reliance on user names and passwords for user authentication. They are also learning more about the benefits of deploying strong user authentication to increase the level of assurance for online identities as part of an overall approach to securing access to information and managing risk.
Breaches Make a Mockery of PCI Security Standards
May 13, 2008
The restaurant-slash-arcade-slash-bar Dave & Buster's is the latest U.S. outlet to suffer a breach of its credit card processing system. Hackers based in Ukraine and Estonia -- assisted by a guy in Miami -- installed packet sniffer malware at the point of sale systems in several D&B outlets.
The Art of Data Management Compliance, Part 3: Executing Processes
April 28, 2008
Data management rules and regulations have become a major concern for businesses, due in large part to increasing oversight that often requires organizations to invest in new technologies in order to address compliance issues. However, the promise of enterprise technologies as a solution to the demands of data management compliance will go unmet absent a context of sound policy and strategic planning.
The Art of Data Management Compliance, Part 2: Guarding Against Theft
April 27, 2008
Identity theft, a cyber-crime causing inestimable damage for scores of ordinary citizens, has prompted passage of the federal FACT Act Identity Theft Red Flags Rule, issued this year. Part of the 2003 Fair and Accurate Credit Transactions Act, the rule aims to combat the scourge of identity theft, which each year victimizes 8.3 million Americans for a total of $15.6 billion in losses, according to the FTC.
Expert: Domain Name Redirects Open Door for Hackers
April 21, 2008
Internet service providers that serve advertising when a user requests a Web page that doesn't exist are exposing their users to a giant security breach, according to security researcher Dan Kaminsky. The vulnerability resulting from the practice, which is an increasingly common way for ISPs to make money from users' typos, was identified last week on Earthlink by Kaminsky.

See More Articles in Consumer Security Section >>
ZOHO CRM
More E-Commerce Times Headlines