The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's research...
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...
Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks. Concerns about data security also have been shown to increase with ownersh...
A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with...
Norton by Symantec on Tuesday announced the Norton Core secure router for smart devices in the connected home at CES. The router protects up to 20 PCs, Macs, Android and iOS smartphones and tablets on a home network, and unlimited devices connected to the IoT. It will update its firmware in backgrou...
Facebook top dog Mark Zuckerberg had several of his social media accounts breached and defaced, according to reports that surfaced Sunday. Zuckerberg's Twitter, LinkedIn and Pinterest memberships were hacked, but evidence of the attacks quickly disappeared. In addition to requiring passwords, Twitte...
The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...
Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice. A drive-by occurs when an infected website automatically down...
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with maj...
Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has d...
Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, t...
A sophisticated malware program called "Regin" has been used in systematic spying campaigns against a range of international targets since at least 2008, Symantec reported. Regin is a backdoor-type Trojan with a structure that displays a degree of technical competence rarely seen in malware, accordi...
Over the 4th of July weekend, 82 people were shot in Chicago, and at least 14 of them died from their wounds. For the year, there were 63 homicides in Oakland as of late October. Philadelphians logged 47 homicides in the first 64 days of this year, two more than were killed in New York City during t...
iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If...
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 were cle...
Expect an unprecedented tsunami of excitement.
Look for a bigger surge of enthusiasm compared to recent Apple events.
Anticipate the typical level of interest sparked by a wave of Apple news.
With only a mild ripple of interest.
WWDC, yawn.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/russian-hacker-group.jpg
https://www.ecommercetimes.com/story/doj-five-eyes-nations-unite-to-dismantle-russian-cyber-espionage-network-178292.html
DOJ, Five Eyes Nations Unite To Dismantle Russian Cyber-Espionage Network
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/business-presentation.jpg
https://www.ecommercetimes.com/story/customer-analytics-now-a-pivotal-piece-of-the-retail-sales-puzzle-177486.html
Customer Analytics Now a Pivotal Piece of the Retail Sales Puzzle
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/retail-clothing-shoppers.jpg
https://www.ecommercetimes.com/story/how-brands-can-gear-up-for-a-possible-recession-in-2023-177368.html
How Brands Can Gear Up for a Possible Recession in 2023
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/04/Walmart-mobile-shopping-app.jpg
https://www.ecommercetimes.com/story/will-walmart-using-generative-ai-break-open-pandoras-retail-box-177549.html
Will Walmart Using Generative AI Break Open Pandora’s Retail Box?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/retail-checkout-counter.jpg
https://www.ecommercetimes.com/story/young-shoppers-in-stores-expect-easy-digital-payment-service-options-177460.html
Young Shoppers in Stores Expect Easy Digital Payment, Service Options
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/04/sales-force-team.jpg
https://www.ecommercetimes.com/story/intent-data-strategies-provide-a-lifeline-to-crm-176956.html
Intent Data Strategies Provide a Lifeline to CRM
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/supply-chain-shipyard.jpg
https://www.ecommercetimes.com/story/the-vital-role-of-tech-adoption-in-overcoming-supply-chain-hurdles-177001.html
The Vital Role of Tech Adoption in Overcoming Supply Chain Hurdles
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/Tidio.jpg
https://www.ecommercetimes.com/story/tidio-delivers-ai-crm-for-smbs-176983.html
Tidio Delivers AI CRM for SMBs
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/telehealth-provider.jpg
https://www.ecommercetimes.com/story/digital-health-care-flourishing-despite-legal-logistical-hurdles-177497.html
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
Enter your Username and Password to sign in.
Social Media
See all Social Media