Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com
Firehost


 Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.

Ridding the Web of the XSS Scourge
October 19, 2009
Cross-site scripting/SQL injection attacks have been blamed for numerous data breaches, perhaps most notably the nightmare of the Heartland Payment Systems data breach. This type of attack has been around for at least a decade. However, the tendency for programmers to continue with old, insecure code writing techniques make XSS one of the most deadly methods for hackers.
Navigating the New Cybercrime Threatscape, Part 1
September 09, 2009
Cybercrime is pervasive, pandemic and increasingly connected with other parts of the criminal ecosystem. It ranges from the theft of an individual's identity to the complete disruption of a country's Internet connectivity due to a massive attack against its networking and computing resources.
Social Security: Guarding Your Identity in Online Networks
August 26, 2009
Without a doubt, the growth of social networking has exploded in recent years and has added value to the Internet by providing yet another exciting way for citizens all over the world to connect and interact. In fact, social networks like Facebook, MySpace, Twitter, LinkedIn and many smaller sites have become the preferred way many people communicate today as well as a growing business development tool.
A Last Call for Snarkers Anonymous?
August 21, 2009
The old saying used to be, "If you can't say anything nice, then don't say anything at all." Then the Internet came along, and the saying changed to, "If you can't say anything nice, then invent a fake user name and go to town." The Web has allowed us to get away with saying some pretty awful things to each other without having to say them to each others' faces -- or even put our own names on them.
Is There a Dark Cloud Over SSL's Green Glow?
August 19, 2009
The security of any given computer system is no better than the skills researchers bring to finding the next potential program flaw. Network security workers concentrate on updating patches and making sure only validated users can access the corporate LAN. Meanwhile, security researchers hunt for existing but unidentified infrastructure flaws that could let in the bad guys.
Microsoft Forges 3 New Security Tools
July 28, 2009
Despite the best efforts of the computer security industry, hackers are launching more attacks than ever. In turn, members of the industry are working together to combat the threat. In line with this, Microsoft on Monday unveiled some new tools at the Black Hat security conference in Las Vegas, Nev. These include Microsoft Security Update Guide, Project Quant, and Microsoft Office Visualization Tool.
Cyberattack Defense: Staying One Step Ahead of Hackers
July 16, 2009
Describing cyberterrorism as a "weapon of mass disruption," President Barack Obama released in late May the findings of a 60-day cybersecurity review. The statistics told the ugly story: Last year alone, cybercriminals stole intellectual property from businesses worldwide worth up to $1 trillion.
Where Are the Cybercops?
July 13, 2009
The month of June saw a host of Web-based attacks compromising legitimate Web sites. One, dubbed "Nine Ball," compromised more than 40,000 Web sites. Another attack injected a malicious script into large numbers of legitimate sites. What can be done about these attacks, and who's policing the Web anyhow?
A Week of Free Updates, Free Advice and Free Speech
June 19, 2009
What we're seeing in Iran could be the beginning of some big political changes. Fishy results in the presidential election last week have led to massive protests, some of which have turned violent. The way the news about the country's turbulence is reaching other parts of the world is monumental in its own right -- symptomatic of the changes that have been brewing ever since the term "Web 2.0" moved into cliché territory.
Friend or Fraud? Security and Social Networks
June 18, 2009
Back in January, friends of Seattle, Wash., resident Bryan Rutberg were stunned when they read e-mails from his Facebook account accompanied by his photo. In the messages, Bryan appeared to claim he was in big trouble and that he needed their help. At least one friend wired him money. However, Rutberg wasn't really in trouble and was in no need of assistance.
Microsoft Hauls Click Fraudsters Into Court
June 16, 2009
Microsoft has initiated a civil lawsuit in the Western District of Seattle seeking $750,000 in damages from three individuals in Vancouver, British Columbia, for committing click fraud. The three alleged fraudsters are two brothers and a mother -- Eric Lam, Gordon Lam and Melanie Suen -- who, according to Microsoft, have deployed botnets to drive up clicks at Web sites that compete with theirs.
Keeping Credit Card Numbers Well-Cloaked: Q&A With Fingerhut's Mark Lieberg
June 11, 2009
It's a fact that might not bring a lot of comfort to consumers and businesses, but it's true: The methods for protecting e-commerce transactions haven't changed a great deal since online shopping became a viable option in the early '90s. SSL and TSL encryption are the protocols that slap on that little padlock you see at the bottom of a Web site once you've begun the purchase process.
An Xserve Lift, an iTunes Shift and a Gift Card Grift
April 10, 2009
Most of Apple's core products have seen some sort of refresh since last September, and it appears there aren't a whole lot left to update any time soon. Most recently, Apple unleashed Intel's Nehalem processors in its Xserve server line, which doubled the performance ... so, that's cool, but definitely cool for a limited audience of professional business users.
Scammers Swarm: Tax Time Is Open Season for Phishers
April 08, 2009
It's tax time again, and the online scammers are crawling out of the woodwork. Their goals are to intercept personal information about taxpayers nationwide, and in some ways, they may be benefiting from the IRS' push for people to electronically file their returns. Some scammers are "phishing" taxpayers by sending emails that claim to be from the IRS.
New Recession-Era Twist in Cyber-Crime: Preying on Fear
March 15, 2009
Everyone knows cyber-crime is a cat and mouse game, usually involving a bit of social engineering to trick unsuspecting computer users into clicking a link, installing some software or providing valuable information. The latest trick in crooks' bags: "recession malware."
Telltale Signs of E-Commerce Fraud
February 25, 2009
In a time of economic crisis, there tends to be an increase in the number of people that turn to criminal activity. Although petty crime is usually one area that shows a significant upswing, an additional form of criminal activity on the rise is fraud. Before you can stop fraud, you need to know how to define it in order to properly identify it.
Heartland Bleeds Data, Potential Victims Could Number Millions
January 21, 2009
Massive credit card payment processor Heartland Payment Systems disclosed Tuesday that a security breach within its processing system some time in 2008 resulted in the potential exposure of millions of credit card and debit card numbers. No cardholder Social Security numbers, addresses or telephone numbers have been compromised, and the intrusion is believed to have been contained, according to the company.
Security Wonks Find Gaping Hole in Trusted Site System
December 30, 2008
An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be accepted and trusted by many widely used Internet browsers.
Are Banks Short-Changing You on Security?
December 18, 2008
Given the financial fallout we've all been treated to this year, online banking and investment transactions may face increasing risks from hackers and sub-par network security. Buying and selling via the Internet is the most common form of trading stock -- and the most vulnerable. With so much money changing hands through the Internet, bank security risk is critically high.
The Computer Fraud Act: Bending a Law to Fit a Notorious Case
December 09, 2008
Until recently, the Computer Fraud and Abuse Act -- covering a myriad of activities related to hacking and intellectual property theft -- was just one of many questionable federal laws on the books. Then came the case of Lori Drew. Though widely vilified, there was a certain uneasiness in many legal quarters about prosecuting her under the Computer Fraud and Abuse Act.

See More Articles in Cybercrime Section >>
Firehost
More E-Commerce Times Headlines