![]()
Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.
|
House Passes Bill Outlawing Caller-ID Spoofing April 16, 2010
The Truth in Caller ID Act passed the U.S. House of Representatives on Wednesday. The bill aims to prevent misrepresentation of the called-from number on voice calls through any channel. Called "caller ID spoofing," the practice involves using various types of software to insert a name and number perceived by a call recipient to be legitimate into the called-from field.
|
Judge Imposes Stiff Sentence on Heartland Hacker March 26, 2010
U.S. District Judge Patti Saris sentenced computer hacker Albert Gonzalez to 20 years in prison for his role in stealing 40 million debit and credit card numbers that resulted in an economic loss of $200 million, according to the U.S. government's best estimate. The sentence closes what was the largest credit and debit card theft in U.S. banking history.
|
|
French Hacker Played Guessing Game to Access Twitter Accounts March 26, 2010
After months of investigation by police and the FBI, a French hacker accused of breaking into the Twitter accounts of President Barack Obama and singer Britney Spears was arrested earlier this week. Francois Cousteix, a 25-year-old unemployed man from central France who is known online as "Hacker Croll," is also accused of breaking into Twitter administrators' accounts and copying confidential data.
|
Massive Botnet Foiled but Thousands Roam Free March 04, 2010
The three men accused of unleashing a vicious cyberassault that infected millions of computers worldwide may now be in jail, but the damage they left behind should serve as a warning for computer users to stay vigilant. The Mariposa botnet, a massive network of infected computers designed to steal account information, infiltrated an estimated 12.7 million computers.
|
|
Can an Act of Congress Give the US the Cybersecurity It Needs? February 22, 2010
Within about a year, the United States may be better prepared to defend itself against a cyberattack, if the Senate passes Bill H.R. 4061, also known as the Cybersecurity Enhancement Act of 2009. This bill is a combination of the Cybersecurity Research and Development Amendments Act of 2009 and the Cybersecurity Coordination and Awareness Act of 2009.
|
Evil Kneber Botnet Packs Mighty Malware Punch February 18, 2010
As botnets go, the Kneber botnet, which has hit about 75,000 PCs in roughly 2,500 companies worldwide, is fairly minuscule. However, it's disproportionately dangerous because it's aimed at very specific targets -- corporations and government departments -- whose PCs store critically important information, such as Social Security numbers and corporate login credentials.
|
|
IBM Taps Power of DAM With Guardium Buy February 04, 2010
In November 2009, IBM announced its acquisition of Guardium, a privately held company based in Waltham, Mass., and the planned integration of Guardium's Database Activity Monitoring technology into IBM's Information Management and Business Analytics and Optimization initiatives. Financial terms were not disclosed.
|
Twitter Smells a Password-Snatching Rat February 03, 2010
Twitter users have come under attack from scammers once again, and the microblogging site has asked several users to reset their passwords. This latest attempt came through torrent file-sharing sites that contained hidden security exploits and backdoors. Opinion is divided as to whether these security holes were the result of bad coding or were deliberately created so the coder could later activate them.
|
|
Rethinking the Fortifications: Q&A With Heartland CIO Steven Elefant February 01, 2010
Following a breach of its computer systems a year ago, Heartland Payment System, one of the five largest payment card processors in the United States, came under considerable pressure to strengthen its IT security, and it's been embroiled in several lawsuits because of the breach.
|
The Byzantine Art of Password Protection January 22, 2010
Although news of data breaches and computer hacks make headlines almost daily, individual users and companies too often simply don't protect their passwords strongly enough. Most users tend to select simple or common passwords or leave the default passwords of hardware and software they purchase unchanged.
|
|
Are We Risking Our Digital Lives? January 20, 2010
Consumers are growing increasingly comfortable storing sensitive information on their computers, USB flash drives, and external hard drives, as well as using Web-based solutions to automate regular tasks such as shopping for holiday gifts, paying bills and tracking financial portfolios. At the same time, cybercriminals are developing increasingly savvy techniques.
|
Sidestepping Swindlers in the New M-Commerce Frontier January 13, 2010
As the number, power and flexibility of mobile devices has increased, so has their use for shopping. In 2008, a Nielsen survey found that 9 million people in the United States "have used their mobile phone to pay for goods or services," and many more expect to do so soon.
|
|
The Legal Thicket of Federated Identity Management January 12, 2010
In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions -- "Who are you?" and "How can you prove it?" -- is fast becoming a critical requirement for all online business activities. Moreover, solving this "identity management" challenge has become quite complex.
|
Everyone's Stoked About Cyber Monday - Vendors, Customers and Hackers November 14, 2009
Less than 20 days until Cyber Monday. You've got staffing queued up. Your warehouse is full. Your shipper is standing by. But have you considered what will happen on your Web site after a flood of qualified buyers click on the irresistible and precisely worded ad for your product or service? You've got one shot -- one day -- to win their holiday business.
|
|
Drawing Security-Spooked Customers Into the E-Commerce Fold November 11, 2009
Many consumers are still afraid of shopping online, and it's not hard to see why, with reports of fraud, identity theft, data loss and other security breaches regularly making the news. The fact is, though, online shopping is safer than ever before, and new and emerging security technologies, methods and standards are being implemented every day.
|
'Tis the Season for Safe Holiday Shopping November 07, 2009
While recent reports don't predict a major recovery for retailers this holiday season, the outlook for e-commerce sites is slightly more optimistic: 2009 will post an 18 percent increase in online holiday shopping over last year. For many consumers, though, the convenience of online shopping comes with a hefty price: their identity.
|
|
Keeping Your Secrets Safe in a World Gone Social October 28, 2009
Social networking platforms allow both anonymous and open communications with the world, giving us a voice and a forum to share our thoughts publicly and privately. However, with the growing threat of identity theft and other cybercrimes, social networks also present a new set of risks.
|
Ridding the Web of the XSS Scourge October 19, 2009
Cross-site scripting/SQL injection attacks have been blamed for numerous data breaches, perhaps most notably the nightmare of the Heartland Payment Systems data breach. This type of attack has been around for at least a decade. However, the tendency for programmers to continue with old, insecure code writing techniques make XSS one of the most deadly methods for hackers.
|
|
Protecting Your Identity From Social Networking Shysters October 12, 2009
Social networking sites like Twitter, Facebook and LinkedIn have entered the mainstream -- and fraudsters are taking notice. In recent months, Fox News Network, CNN Anchor Rick Sanchez, and even President Obama have suffered high-profile hacks of their Twitter accounts.
|
Certified Ethical Hacker: Not Your Everyday Job October 07, 2009
Computer infrastructure has become the foundation of businesses, governments, and militaries across the globe. Unfortunately, the onset of computer dependence has only opened a myriad of opportunities for cybercrime and potentially devastating consequences.
|
See More Articles in Consumer Security Section >>


Headline Feeds




















