- Welcome Guest
- Sign In
Junk e-mail, the way most computer users see it, has become more prolific than postal junk mail. It overloads inboxes and consumes valuable hours each day. Every day, e-mail users must weed through appeals to buy everything from phony products and stock offers to drugs and body-part enhancers -- not to mention the countless free passes to porn sites...
File-sharing through the dozens of software piracy mills on the Internet and well-known peer-to-peer networks like Kazaa, Morpheus, iMesh, eDonkey, Gnutella, LimeWire and Grokster accounts for thousands of illegally downloaded music files, games, movies and software. Computer security experts warn that more harm than the mere theft of intellectual property by piracy occurs through participation in file-sharing over the Internet. For example, use of file-sharing operations usually leads to situations in which computers -- and even networks -- are infected with spyware, malware and backdoors left ajar for hackers...
Security experts are warning that malware attacks will pose more of a major threat over the next three years than direct hacker attacks. The British mi2g Intelligence Unit claimed this week that the malware risk has risen from 1 in 40 last year to about 3 in 10 for 2004. This reflects a jump from 2.5 percent to 30 percent risk ...
Security attacks on IT systems have more than doubled since last year. That's what 100 IT chief security officers at financial institutions around the globe reported in a global survey compiled by Deloitte & Touche LLP. External security attacks on information technology systems at a sampling of the world's leading financial institutions more than doubled from a year ago, according to those who responded to the rigorous global survey. Deloitte & Touche LLP is one of the nation's leading professional services firms...
Is it possible to end the investigations and prosecutions that the RIAA, the music download police and similar entities use to prosecute users of file-sharing networks? The answer depends, say online security experts, on which next-generation technology proves to be more successful. So far, enforcement investigators hold the upper hand ...
Viruses delivered by e-mail, phishing attacks and spam are becoming as much a part of using computers as accidents, tolls and bumper-to-bumper delays on the freeway are in commuting to work each day. Both situations cause frustration, steal productivity and cost money ...
In today's world of merged business and technology applications, e-mail has become as essential as the telephone. But e-mail on the corporate level is also one of the most deadly communication tools. It is through e-mail that most security risks occur, warn security specialists ...
Searching for data on a PC used to be a series of isolated activities. Users needed one or more computer-based software utilities to hunt through the hard drive for specific files containing keywords. Finding information beyond the hard disk meant logging in to a library or university system and entering archaic Boolean search terms into a distant server's query window...
A real security threat is looming with wireless PDAs, WiFi devices and smartphones. These are the electronic marvels that are pushing the goal of wireless telecommunications to new limits. Industry watchers report that people are dropping their older PDAs like hot potatoes and snapping up the latest generation of wireless devices like crazy ...
A new worm that first materialized last Tuesday appeared in its third minor variant early this morning. The Sasser worm threatens any unprotected Windows computer tethered to the Internet via a broadband connection ...
In mid-March, BJ's Wholesale Club announced it was investigating a security breach that involved theft of credit card information from its computer network. Company officials ordered an exhaustive review of the retail outlet's state-of-the-industry technology systems with a leading computer security firm. ...
A new worm materialized yesterday in the U.S. Pacific region and was continuing a slow circulation across the U.S. mainland last night in search of compromised computer systems ...
Early warning last week about increased signs of a possible superworm in the making may have slowed down a new attack on the Internet. But evidence continues to grow, according to a VeriSign security officer, of a major new denial-of-service attack to be mounted from thousands of already-infected computer systems ...
An increase in suspicious activity this weekend has Internet security experts bracing for what some analysts warn could be the next big worm attack worldwide. Virus monitors spent the weekend watching an increased level of activity that experts said could be the start of a Blaster-like attack ...
Software can kill you. Don't think so? Talk to the family members of 21 deceased patients treated at the National Cancer Institute in Panama in November 2000. The cancer patients died after being overdosed by a Cobalt-60 radiotherapy machine. The technicians who entered patient and medication data into the software that guided that machine will stand trial starting May 18th in Panama City on charges of second-degree murder...
Despite aggressive tactics by U.S. agencies to crack down on illegal software warehouses, distribution of illegal software continues to rival legitimate software retail sales. Studies by industry watchdogs show that while worldwide software piracy has declined steadily from a rate of 50 percent to about 30 percent, the cost of piracy to software manufacturers remains about the same. By some estimates, that cost exceeds US$15 million per year...
Compare the vastness of the Internet with the microminiaturized world of subatomic structures, and you will get an idea of the potential that nanotechnology holds for industrial profit. Some analysts are predicting nanotechnology will become the biggest boost to the technology industry since the World Wide Web ...
A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks that would shut down the targeted Web site ...
Voice over Internet Protocol pioneers Skype, Vonage and other voice-communications purveyors have been quietly generating huge user bases online. Market analysts are reporting that VoIP services stand poised to displace conventional telecommunications pricing models. Given the success of improved VoIP technology, industry pundits wonder whether traditional telecommunications technology will adapt or be pushed aside...
If one thing is definite about Internet security and worm attacks, say experts, it is that cyber attacks are on the rise in 2004 ...
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/hacker-team.jpg
https://www.ecommercetimes.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/01/robot-on-keyboard.jpg
https://www.ecommercetimes.com/story/cybersecurity-expert-pegs-ai-as-online-shoppings-biggest-threat-177933.html
Cybersecurity Expert Pegs AI as Online Shopping’s Biggest Threat
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/ecommerce-smb-warehouse.jpg
https://www.ecommercetimes.com/story/optimize-your-amazon-presence-for-maximum-sales-success-177907.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/dating-app-smartphone.jpg
https://www.ecommercetimes.com/story/mozilla-waves-red-flag-over-data-hungry-dating-apps-179144.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/cashless-payment-cafe.jpg
https://www.ecommercetimes.com/story/mobile-payment-industry-innovations-driving-online-in-store-sales-177930.html
Mobile Payment Industry Innovations Driving Online, In-Store Sales
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/search-engines-smartphone.jpg
https://www.ecommercetimes.com/story/gartner-predicts-25-dip-in-search-volumes-by-2026-177921.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/online-shopper.jpg
https://www.ecommercetimes.com/story/temu-and-homary-online-retailers-that-are-generally-a-good-value-179105.html
Temu and Homary: Online Retailers That Are Generally a Good Value
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/AI-circuit.jpg
https://www.ecommercetimes.com/story/ai-no-longer-curiosity-for-retailers-but-key-to-better-business-report-177857.html
AI No Longer Curiosity for Retailers but Key to Better Business: Report
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/future-retail.jpg
https://www.ecommercetimes.com/story/the-future-of-gen-ai-in-retail-balancing-human-factors-with-revenue-growth-177923.html
The Future of Gen AI in Retail: Balancing Human Factors With Revenue Growth
Social Media
See all Social Media