An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be...
Given the financial fallout we've all been treated to this year, online banking and investment transactions may face increasing risks from hackers and sub-par network security. Buying and selling via the Internet is the most common form of trading stock -- and the most vulnerable. With so much mone...
Well, the holiday season is upon us once again, and that means it's the beginning of what, for many geeks, is a time of unnatural, enforced, repeated and prolonged socialization. Yes, it can be an uncomfortable time for those of us who aren't perky, extroverted cheerleader-types, and we here at Linu...
The history of James Bond films is the history of our fascination with technology: booby-trapped briefcases, jetpacks, cars with machine guns and ejector seats, super-magnet watches, cars driven by remote control, acid-filled fountain pens, cars that become invisible, sharks with frickin' lasers...
Mirror, mirror, on the wall, who are the greatest geeks of us all? That question -- posed in an Australian iTnews article, "The Top 10 Greatest Geeks of All Time" on Monday -- sparked quite a discussion in the blogosphere last week, garnering more than 1,300 Diggs and 280 comments by Friday. Who was...
The scenarios jump right out of a Brad Thor or Vince Flynn technothriller novel: Terrorists, using the microblogging service Twitter in conjunction with Google Maps, cell phone video and global positioning system technology, stage an ambush on troops in Iraq or coordinate an attack in an American ci...
Microsoft has angered Chinese computer users with its latest antipiracy move. On Tuesday, during its Global Anti-Piracy Day, Microsoft turned Windows Genuine Advantage loose on the Chinese people. Other users worldwide are familiar with WGA, which famously labeled legitimate users as pirates and dis...
The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...
"Geekonomics is really about the economics of a technology ... and the positive and negative impact on us." That's according to David Rice, author of "Geekonomics: The Real Cost of Insecure Software." In his book, Rice discusses how software defects severely impact the U.S. economy and national secu...
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...
If you're a ninja assassin, a terrorist, an illegal street racer, or any other variety of violent outlaw, you shouldn't look to YouTube for training anymore; you won't find any there. The Google-owned video sharing site has revised its policies to specifically forbid videos that offer instructions o...
Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...
Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business...
IBM is increasing its arsenal against hackers with a new beefed-up blade server. The IBM BladeCenter PN41, announced this week, combines Deep Packet Inspection technology from CloudShield with IBM's other protection platforms to create a powerhouse against attacks. The system is designed specificall...
Extremely - Personalization is a must. Without it, there's little chance of earning my loyalty.
Relatively - Personalization is a plus, but I do consider other factors when deciding who gets my business.
Minimally - Personalization is now automated and commonplace. Brands must do more to make me feel special to earn my loyalty.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/cloud-server.jpg
https://www.ecommercetimes.com/story/the-cloud-has-pushed-identity-to-its-breaking-point-whats-next-177750.html
The Cloud Has Pushed Identity to its Breaking Point. What’s Next?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/cyberwarfare-3.jpg
https://www.ecommercetimes.com/story/holiday-season-sees-onslaught-of-ransomware-ddos-attacks-177544.html
Holiday Season Sees Onslaught of Ransomware, DDoS Attacks
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/multifactor-authentication-2.jpg
https://www.ecommercetimes.com/story/mfa-is-broken-heres-how-to-fix-it-177538.html
MFA Is Broken, Here’s How To Fix It
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/holiday-gift-card.jpg
https://www.ecommercetimes.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/student-computer.jpg
https://www.ecommercetimes.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
Enter your Username and Password to sign in.
Social Media
See all Social Media