Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com


 Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.

Feds Probe Hack of First Lady, Biden, Celebs
March 13, 2013
Police in Los Angeles have teamed with the FBI to investigate Russian hackers suspected of stealing and posting sensitive information about Michelle Obama, Joe Biden, law enforcement officials and Hollywood celebrities. The material in question was posted on a website using .su as a suffix -- reportedly a tip-off that the perpetrators have a Russian connection.
Google Hit With $7M Fine at the Privacy Tollbooth
March 13, 2013
Google has settled its Street View privacy case with 38 states and the District of Columbia. As part of the settlement, the company will destroy the personal information it collected under the project, train its employees on privacy issues for a 10-year period, launch a campaign to educate consumers on WiFi security, and pay a $7 million fine.
GPS and the Law: You Can Run but You Can't Hide
March 13, 2013
There are more than 6 billion mobile devices in the world. As of last July, there were more than 321 million wireless subscriber connections in the U.S. alone. Given the wide penetration of wireless gadgets, it is no surprise that GPS location devices are now getting a great deal of attention in both civil and criminal courts.
Likes Can Tell the Story of Your Life
March 12, 2013
It is possible to predict intimate personal characteristics such as sexual orientation by studying a person's Facebook Likes, according to findings released Monday by University of Cambridge researchers. Just by studying Likes, the team was able to determine a person's race, age, IQ, personality type, level of substance use and political views with a surprising degree of accuracy.
China Suggests Setting Rules for Cyberwar Games
March 11, 2013
As it continues to deny accusations that its army is involved in serial computer hacking, China is now also asking for worldwide rules and cooperation on Web-based espionage. China cited the lack of international definitions and regulations on cyberespionage as part of its first round of denials against the landmark report by security firm Mandiant.
Judge Orders Apple to Quit Pussyfooting Around
March 11, 2013
A judge gave Apple until the end of last week to produce details about how it would provide documents and other evidence requested in a privacy lawsuit. U.S. Magistrate Judge Paul S. Grewal issued the order in San Jose, Calif., on March 6, following claims from the plaintiffs' lawyers that Apple was withholding documents it had been ordered to produce.
Phishers Cast Longlines to Hook More Victims
March 11, 2013
Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing. "The technique allows you to hit a lot of people very quickly and largely go undetected," said Dave Jevans, founder and CTO of Marble Security.
How to Drink from the Big Data Firehose Without Drowning
March 11, 2013
The arrival of big data means the end of the status quo for the enterprise. It means more than just sorting the sheer volume and velocity of information now available to companies. To be able to derive the most value from big data, large enterprises now have to consider its impact on issues such as security, risk and governance.
Hackers Escalate Reign of Malware Terror on Android
March 08, 2013
Android has become a mobile malware magnet, according to F-Secure. A whopping 79 percent of all mobile malware targeted the Google OS in 2012, based on a new report from the firm. That was up from 66.7 percent in 2011 and just 11.25 percent in 2010. The fourth quarter of 2012 was particularly bad, it said, with attacks on Android spiking to account for 96 percent of all mobile malware.
Reports: US Cybersecurity Firewalls Built on Shaky Foundations
March 08, 2013
A pair of new reports suggest that despite repeated attempts by the Obama administration to beef up U.S. cybersecurity, the nation is not ready to handle a major attack, and government agencies lag far behind deadlines for showing security improvements. Those conclusions are reached by the Office of Management and Budget and the Defense Science Board Task Force.
FBI Wins Skirmish in War on Dotcom
March 05, 2013
Kim Dotcom experienced a legal setback late last week when the New Zealand Court of Appeal overturned a lower court ruling that had required the U.S. Federal Bureau of Investigation to disclose all of its evidence against him. However, his fight to avoid extradition is nowhere near closure.
Hackers Clip Evernote, Forcing 50M Password Resets
March 04, 2013
Evernote, which makes software that lets users copy and store a variety of text and Web pages, announced over the weekend that it had been hacked, forcing the company to ask its 50 million users to reset their passwords. The company said hackers gained access to usernames, email addresses associated with Evernote accounts, and encrypted passwords.
China on Cyberattacks: US Is Pot Calling the Kettle Black
March 04, 2013
After taking it on the chin for its alleged attacks on U.S. media outlets -- and for its army reportedly backing hackers engaged in cyberespionage around the world -- China returned fire. The government claimed its defense and military ministries' websites are being bombarded with 144,000 hacking attacks a month from the U.S.
Advocating for Linux on the Front Lines and in the Kernel
March 04, 2013
Well March has arrived here in the Linux blogosphere and with it, widespread hopes for the rebirth and renewal of spring. Linux Girl wishes she could say things have been calm and tranquil over the past few days, but of course they haven't -- this is the Linux community we're talking about, after all. There have been many trials and tribulations for Linux fans recently.
With Business Foundations Shaking, Good Enterprise Architects Are Hard to Find
March 04, 2013
Enterprise architects are looking at several trends impacting their roles in the business world -- the growth of cloud computing, the arrival of big data, more security challenges, the overall rate of technological advances. These are the topics discussed at conferences.
Facebook's New Ad Tool Targets You Online and Off
February 28, 2013
Facebook users will soon see ads in their feeds that are more specifically targeted to what they like and where they've shopped -- both online and offline -- thanks to a series of agreements with data companies announced Wednesday. The agreements expand the social network's Custom Audiences program released last September, which was designed to allow advertisers to target their existing customers via Facebook.
US Wants Private Sector to Secure Government Cloud
February 27, 2013
The U.S. government has some unique -- and exacting -- security requirements related to the adoption of cloud technology. These internal government security hurdles have resulted in significant outreach to expertise from commercial information technology companies. The latest example is an invitation from the General Services Administration to the private sector to take over a critical element in the security certification of federal cloud deployments.
FTC Gives HTC a Good Shaking Over Bungled Security
February 25, 2013
The Federal Trade Commission last week reached a settlement with HTC America over charges the company failed to take reasonable steps to secure the software in its smartphones and tablet computers. The security flaws could have compromised the privacy of millions of consumers, the agency said. This is the FTC's first case against a mobile device manufacturer.
Hackers: The Flies in Social Media Marketing Ointment
February 25, 2013
Did you hear? McDonald's has just acquired Burger King! Also, someone at the company apparently has a potty mouth. Another unusual and unexpected corporate trade also happened last week -- Cadillac acquired Jeep. These events, of course, didn't really happen. In both instances, hackers gained control of the brands' Twitter accounts and began sending out false and sometimes very offensive tweets.
Hacks, Hijacks and Hunts for Chinese Data Thieves
February 25, 2013
Still smarting from a recent attack on its systems, Facebook started its week with a discovery by researchers at Bitdefender that an infected add-on at the Chrome Web Store was planting malware on its members' computers. The malware, among other things, was padding the Like counts on dummy Facebook pages.

See More Articles in Security Section >>
SingleHop PCI Cloud Hosting
ZOHO CRM
Firehost
More E-Commerce Times Headlines