Radio frequency identification (RFID) tags have been around since World War II, when the British Royal Air Force affixed tags to planes as a way to distinguish friend from foe, but it wasn't until 2003, when giant discount retailer Wal-Mart announced that it would require the tags on all shipments f...
New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud. Congress passed The Fair and Accurate Credit Transactions Act, known as FACTA,...
Information technology experts warn that lingering security issues are making Radio Frequency Identification, or RFID, another uncontrolled tool for identity theft. RFID is an old inventory control technology that is quietly being deployed throughout business and industry to track everything from pe...
At first glance, the proposal to create a new cyberspace red light district with the .xxx domain seems a clear win for legitimate businesses. The domain, which has been approved by the Internet Corporation for Assigned Names and Numbers, could essentially segregate adult-content and pornography, mov...
Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential. A Gartner report by securit...
The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming ...
Chief risk officers aren't just for banks anymore, but analysts say the position still is only necessary for certain companies. A position that first appeared in the financial services industry to deal with a bundle of compliance and security issues, chief risk officers, or CROs, are now spreading t...
Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. "The most prevalent ID theft threat is the phishing attack, and it is getting worse. Attacks...
Spam-fighting strategies used by ISPs and consumers might be turning the tide against unwanted e-mail. However, innovative phishing scams continue to target both corporate users and consumers. Users of file-sharing networks are particularly vulnerable to attacks, a new industry analysis warns. Accor...
Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service t...
Security risks from instant messaging networks and spam-clogged e-mail inboxes are forcing corporations to finds ways to either limit employee access or clamp down with improved security. Financial firms have an added burden. They must treat instant messages the same as e-mail communication and ensu...
Few analyst reports hit home as squarely as the recent Jupiter Research study on cookie deletion struck at the heart of the Web analytics industry. Released in March, the report said 39 percent of Web users acknowledged deleting cookies -- code stored on a user's hard drive so that a site they click...
In the highly competitive cellular marketplace, carriers are always on the lookout for an edge, a way to differentiate their services from their competitors' offerings. Somewhat surprisingly, for more than a decade, Nextel Inc. has been able to use one enhanced service, Push-to-Talk (PTT), not only ...
On April 27, President George Bush signed a copyright bill that aims to legalize technology that allows users to automatically skip over or mute objectionable content in movie DVDs. Contained in DVD players and other devices, the filtering technology allows parents to prevent their children from see...
Consumers and enterprise IT managers have to become more vigilant about spyware and adware infections to stay ahead of new threats. However, greater awareness of security issues since last year has tipped the scales slightly against intruders. That's a lesson to be learned from an analysis of data c...
Extremely - Personalization is a must. Without it, there's little chance of earning my loyalty.
Relatively - Personalization is a plus, but I do consider other factors when deciding who gets my business.
Minimally - Personalization is now automated and commonplace. Brands must do more to make me feel special to earn my loyalty.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/cloud-server.jpg
https://www.ecommercetimes.com/story/the-cloud-has-pushed-identity-to-its-breaking-point-whats-next-177750.html
The Cloud Has Pushed Identity to its Breaking Point. What’s Next?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/IT-team.jpg
https://www.ecommercetimes.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/multifactor-authentication-2.jpg
https://www.ecommercetimes.com/story/mfa-is-broken-heres-how-to-fix-it-177538.html
MFA Is Broken, Here’s How To Fix It
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/holiday-gift-card.jpg
https://www.ecommercetimes.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/student-computer.jpg
https://www.ecommercetimes.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
Enter your Username and Password to sign in.
Social Media
See all Social Media