![]()
Attract, Retain and Delight More Customers
Close more deals in less time, track your sales activities and access customer data from your mobile device.
Grow your business with Zoho CRM.
Sign up now for a free 15-day trial.
|
Epsilon Breach a Sign of Coming 'CorpTechPocalypse' April 04, 2011
The world's largest permission-based marketing firm, Epsilon, reported on Friday that its computer system was hacked and an unspecified number of email addresses and names were stolen. Epsilon sends around 40 billion emails a year on behalf of its 2,500 clients, which include major banks such as Capital One, JP Morgan Chase, Barclay's Bank, U.S. Bancorp and Citigroup, as well as e-commerce sites.
|
Is P2P Encryption Secure? That Depends... March 01, 2011
In the wake of the highly publicized payment card security breaches of the past few years, point-to-point encryption has emerged as a frontrunner in the search for a stronger defense against data compromise. The technology is also being touted as a solution to limit the scope -- and therefore the expense -- of complying with the Payment Card Industry Data Security Standard.
|
|
FBI Nabs Alleged iPad Who's-Who Leakers January 19, 2011
Two men who allegedly broke into AT&T's computer systems and stole the email addresses of early iPad owners were arrested Tuesday by the Federal Bureau of Investigation. The break-in made headlines last summer because some of the 114,000 email addresses were subsequently published by the gossip website Gawker and contained some high-profile names.
|
Facebook Does About-Face Following Privacy Backlash January 18, 2011
Facebook has temporarily shelved plans to share members' home addresses and mobile numbers with app developers, following a strong backlash over privacy and safety concerns. The social networking giant had announced late last Friday that it would make this information accessible to developers through its User Graph object, subject to certain restrictions.
|
|
Feds Launch Show-and-Tell Site for Online Trusted ID January 12, 2011
The National Institute of Standards and Technology has set up a website to provide the public with information relating to the U.S. federal government's National Strategy for Trusted Identities in Cyberspace program, which is aimed at protecting people's identities online. One of NSTIC's goals is to ensure that people give the minimum information about themselves needed when conducting transactions online.
|
The Gawker Has Become the Gawkee December 13, 2010
Hackers struck at the Gawker blog network's servers over the weekend, stealing more than 1 million rows of data, including cracked passwords. Gawker has been scurrying to revamp security on its servers as a result, and has put up an FAQ page on this issue. Meanwhile, Twitter has been hit with a wave of spam attacks that it blames on the Gawker hack.
|
|
When Disaster Strikes, Customer Relationships Can Be Critical November 11, 2010
Developing good relationships with your customers pays off when all is going well -- but it can also pay big dividends when things go very wrong. In fact, as a recent case illustrates, those relationships nurtured through CRM can set the tone for your corrections and preserve your business. The business in question is Hannants, a chain of hobby shops in Great Britain.
|
5 Tokenization Myths Debunked November 08, 2010
I have a confession to make: I'm a tokenization junky. I live and breathe tokenization, and have been for a few years now. Since I'm serving as lead chair on the PCI Security Standards Council's Tokenization Working Group, it's my job to know everything about tokenization that's going on in the industry and report back to and advise the council.
|
|
Clearing Up Some Common E-Commerce Security Misconceptions October 29, 2010
While the research proves that e-commerce sales will continue to gain popularity as technology advances, there continues to be a correlation with the increased emergence of aggressive cyberthieves who create techniques to breach even the most-protected systems -- and use that card data to purchase unauthorized goods and services.
|
A 2-Pronged Approach to Curbing E-Commerce Fraud October 26, 2010
Despite advances in technology, online fraud and payment security continue to be significant issues and cost drivers for e-commerce merchants. Web applications are the leading source of data breaches and account for the majority of compromised data records. The majority of these records contain payment card data -- highly sought after because it is relatively easy for criminals to monetize.
|
|
This Facebook Password Will Self-Destruct in 20 Minutes October 13, 2010
Facebook has unveiled new measures to keep members secure when they log into its site. One is a temporary password; another is letting people sign out of Facebook remotely. Finally, it will also now regularly prompt members to update their security information. Facebook members must have first listed a mobile phone number in their account information.
|
How E-Commerce Apps Are Putting Your Site at Risk October 05, 2010
E-commerce security has never been more top-of-mind for retailers. Security breaches like the one that happened at TJX in 2007 reverberate not only through the media, but also -- more importantly -- through consumer confidence, for years. Even with an aggressive clean-up strategy, an attack can create lasting damage to a retail brand from which sales may never recover.
|
|
70-Plus Charged in Cybergang Crackdown October 01, 2010
In a set of coordinated investigations, federal, state and local officials filed charges this week against more than 70 defendants who allegedly used cybercrime techniques to defraud both individuals and corporations out of millions of dollars. New York County District Attorney Cyrus R. Vance, Jr., announced the indictment of 36 people in Manhattan alone.
|
Telecoms Fret Over Bust-Up of FCC's Net Neutrality Huddle August 06, 2010
The Federal Communications Commission has reportedly ended a series of talks with major players in the Internet industry on the question of Net neutrality. This followed allegations that Google and Verizon are privately wheeling a deal that would let the latter give preferential treatment to Web traffic from Google on its network for a fee. Google denied the reports.
|
|
That Cute Android Wallpaper May Be Sending Your Data to China July 30, 2010
Personal data about millions of Android users could be sent to a mysterious Chinese website thanks to a set of wallpaper apps in the Android Market. That's according to mobile security firm Lookout, which discovered the questionable apps as part of its new App Genome Project.
|
Torrent of Public Facebook Info Fires Up Privacy Debate July 29, 2010
It's likely not illegal, and it may not even be improper, but the fact that security consultant Ron Bowes gathered and aggregated the information from about 100 million Facebook profiles has created quite a stir. Bowes created his data torrent to aid the development of a password-cracking-protection tool, he has said.
|
|
Safari Autofill Full of Fail July 23, 2010
Safari's Autofill feature, which can be set to automatically insert a user's data such as name and address into Web forms, could expose users to theft of their personal information, according to security expert Jeremiah Grossman. Grossman, the founder and CTO of security firm WhiteHat, wrote in his blog that the feature autofills HTML form text fields with specific attribute names.
|
Report From the Trenches: Health IT Post-HITECH July 20, 2010
Just a few weeks ago, Lincoln Medical and Mental Health Center learned a hard lesson. If you didn't see the news reports, the N.Y.-based healthcare provider notified over 130,000 individuals that their records -- including diagnostic information, Social Security numbers, dates of birth, and other information of use to identity thieves -- was potentially lost.
|
|
YOU May Be Your Company's Biggest Security Threat June 22, 2010
If I wanted to hack your e-commerce business, I'd have your help. It's a fact that no one runs a business from one location (or one computer) anymore. In today's world, work gets done everywhere -- in offices, in homes, in hotels, at airports, and while sipping mocha and siphoning Internet connectivity at coffee shops.
|
FTC to Look Into Copy Machine Privacy Breakdown May 19, 2010
The Federal Trade Commission has responded to an April 29 letter from Rep. Edward J. Markey, D-Mass., expressing concerns about sensitive data stored on digital copiers' hard drives. Markey's letter followed CBS News' April 19 airing of a report on its investigation into the matter.
|
See More Articles in Consumer Security Section >>


Headline Feeds



















