Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com
Firehost


 Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.

Torrent of Public Facebook Info Fires Up Privacy Debate
July 29, 2010
It's likely not illegal, and it may not even be improper, but the fact that security consultant Ron Bowes gathered and aggregated the information from about 100 million Facebook profiles has created quite a stir. Bowes created his data torrent to aid the development of a password-cracking-protection tool, he has said.
Apple Boots Developer for Shady App Store Dealings
July 07, 2010
Security experts will tell you that cybercriminals like to hit online operations with large numbers of users. So it shouldn't be surprising that an unscrupulous individual has apparently been caught lurking in the heavily trafficked Apple iTunes App Store. Clues that something was amiss surfaced over the weekend when apps by a particular developer captured 42 of the top 50 spots in the App Store's "Books" category.
AT&T Takes Heat for iPad Who's-Who List Leak
June 10, 2010
The email addresses and device IDs of more than 100,000 owners of 3G-enabled iPads have been exposed in a security breach, according to wireless provider AT&T. Victims apparently include at least one member of the U.S. President Barack Obama's cabinet, heads of large corporations and other prominent people.
Latest China Web Crackdown Targets 'Hostile' Overseas Forces
May 03, 2010
China is apparently planning to step up its efforts to crack down on online crime. Wang Chen, head of China's Information Office of the State Council, has promised severe punishment for those perpetrating crimes over the Internet, which in China includes the distribution of pornography. He specifically mentioned information from "overseas hostile forces" as one of the effort's main targets.
4 Wiseguys Indicted for Gobbling Up Choice Concert Tix
March 02, 2010
A federal grand jury has indicted four owners and key employees of a company that prosecutors said for years illegally cornered the market on the best concert and sporting event seats. The 60-page indictment accuses the men of directing an international conspiracy to defeat security schemes at Ticketmaster, Tickets.com and other online ticketing sites.
Evil Kneber Botnet Packs Mighty Malware Punch
February 18, 2010
As botnets go, the Kneber botnet, which has hit about 75,000 PCs in roughly 2,500 companies worldwide, is fairly minuscule. However, it's disproportionately dangerous because it's aimed at very specific targets -- corporations and government departments -- whose PCs store critically important information, such as Social Security numbers and corporate login credentials.
US Intel Chief Paints Dark Picture of Cyberattack Defense
February 04, 2010
As the United States' private and public sectors increasingly leverage the Internet, the U.S. intelligence community fears that they are severely endangering the country's critical infrastructure. On its own, neither the public nor private sectors can combat this threat, U.S. Director of National Intelligence Dennis Blair told Congress this week during an annual threat assessment briefing on national security.
Twitter Smells a Password-Snatching Rat
February 03, 2010
Twitter users have come under attack from scammers once again, and the microblogging site has asked several users to reset their passwords. This latest attempt came through torrent file-sharing sites that contained hidden security exploits and backdoors. Opinion is divided as to whether these security holes were the result of bad coding or were deliberately created so the coder could later activate them.
Rethinking the Fortifications: Q&A With Heartland CIO Steven Elefant
February 01, 2010
Following a breach of its computer systems a year ago, Heartland Payment System, one of the five largest payment card processors in the United States, came under considerable pressure to strengthen its IT security, and it's been embroiled in several lawsuits because of the breach.
Are We Risking Our Digital Lives?
January 20, 2010
Consumers are growing increasingly comfortable storing sensitive information on their computers, USB flash drives, and external hard drives, as well as using Web-based solutions to automate regular tasks such as shopping for holiday gifts, paying bills and tracking financial portfolios. At the same time, cybercriminals are developing increasingly savvy techniques.
There's More Than One Way to Plug Enterprise Data Leaks
January 12, 2010
Data leakage prevention is a topic that has been getting a lot of attention lately. Keeping sensitive data from leaving the network has quickly risen to the top of many IT and compliance officers' lists of priorities. DLP will likely be the first thing most organizations spend their 2010 information security budgets on.
Relearning Trust in a Web 2.0 World
December 22, 2009
Social networking sites such as Facebook and MySpace rely on the trusted nature of the relationship between friends, colleagues, associates and followers. Unfortunately, the level of trust that end-users invest in each other is also being applied to the makers of applications and is perhaps a little over-optimistic.
The Mac Cybercrime Immunity Fallacy
November 21, 2009
Recently, ESET commissioned a poll to identify the knowledge, beliefs and experiences of Americans with respect to cybercrime. One of the findings was that 2 percent of Americans think that PCs are not vulnerable to cybercrime, while 9 percent feel a Mac is not vulnerable to cybercrime.
Cyberfraud Arrests Unlikely to Stem ZeuS Rampage
November 18, 2009
British police on Wednesday announced the arrest of two people in the city of Manchester on suspicion of using the so-called ZeuS Trojan horse to commit banking fraud. The couple, who were detained Nov. 3, are out on bail pending trial. ZeuS, also known as "Zbot," is a notorious bit of malware used to steal users' banking and other personal information from their computers.
Safe Mac Computing on an Unsafe Web
November 14, 2009
We first saw the Apple Macintosh at the 1984 Super Bowl. At the time, IBM and Microsoft gave us only text-based computing. The Mac appeared looking like nothing we had ever seen. Its screen was all graphics, all the time. It had a mouse, the first one seen by most people. It was smaller than a PC, lighter and more portable.
Everyone's Stoked About Cyber Monday - Vendors, Customers and Hackers
November 14, 2009
Less than 20 days until Cyber Monday. You've got staffing queued up. Your warehouse is full. Your shipper is standing by. But have you considered what will happen on your Web site after a flood of qualified buyers click on the irresistible and precisely worded ad for your product or service? You've got one shot -- one day -- to win their holiday business.
Drawing Security-Spooked Customers Into the E-Commerce Fold
November 11, 2009
Many consumers are still afraid of shopping online, and it's not hard to see why, with reports of fraud, identity theft, data loss and other security breaches regularly making the news. The fact is, though, online shopping is safer than ever before, and new and emerging security technologies, methods and standards are being implemented every day.
How Etailers Can Take On the Whole World
November 10, 2009
The majority of global markets are growing significantly faster than the United States. Bill Gates has even stated that in the 21st century, a business must use e-commerce to survive. In this economy, thinking outside the proverbial box and expanding a company without taking on significant overhead or structural changes means selling beyond geographic borders.
Fortifying Your E-Tail Operation Against 'Friendly Fraud'
November 03, 2009
Fraud prevention, in its many layers and forms, is one of the most important services that can be provided to e-merchants. With each passing year, fraudsters become more experienced and new forms of fraud are developed. What is different in recent years is that we have been dealing with an economic recession.
Tech Futurist Sees Rosy Prospects for Net Security
November 02, 2009
Sometime between now and the year 2019, Comcast will start going after botnets and will stop sending malicious Web traffic to its customers. Google will send up more alarms if your search results include possibly infectious links. Microsoft and Apple will get better at plugging holes in their software.

See More Articles in Cybercrime Section >>
ZOHO CRM
More E-Commerce Times Headlines