Summer is behind us, but recent memories of credit card processing breaches are still haunting security-conscious consumers, safety-minded merchants and bustling banks. While CardSystems Solutions made media headlines in June after a computer virus captured the private information of millions of con...
Leet has grown to represent attitudes and subcultures that extend beyond the use of leet as a communication system. Leet is challenging traditional patterns of communication system growth and propagation. Its behavior is uniquely tech driven and tech enabled. New forms of leet are encouraged. L...
Less than half the consumers using the Internet feel safe shopping online, according to a survey expected to be released today by Symantec, a maker of anti-virus and security software. The survey, based on a sample of 2,400 consumers, revealed that some 60 percent of those respondents felt less than...
The standards for setting charges -- and later sentences -- for hackers differs dramatically on a state by state basis. But one thing is increasingly clear -- authorities are stepping up action against hackers of mobile phones, PDAs and conventional computer systems. New developments in mobile phone...
Scientist Peiter "Mudge" Zatko makes his living anticipating and protecting users against the next generation of cyber threats. His problem is simple: When he talks, not everybody really listens. If they did, the next generation of cyber threats wouldn't be lurking around the next unprotected comput...
A hacker broke into wireless carrier T-Mobile's server systems network over at least seven months and read e-mails and personal computer files of the U.S. Secret Service, along with hundreds of other customers, the government has announced. Security experts said this is the first of what is expected...
The number of malicious code attacks aimed at mobile phones continues to expand, with the latest threat coming from a variant of the Skulls Trojan. Security firm F-Secure said the variant, which it has dubbed Skulls.D, targets smart phones using the Symbian operating system and disguises itself as a...
In a crushing blow to Microsoft's bid to establish its Passport service as a standard for access across the Web, auction giant eBay has said it will drop support for the service, as well as a second Microsoft-built service that provides updates and alerts through the .NET platform. EBay announced th...
In the not-too-distant past, search toolbars were risky specialty add-ons offered by Internet marketing mavens. Users who installed search toolbars often were granting permission without knowing it to intruders harvesting data on addresses and surfing habits and opening the backdoor to their compute...
An alleged Microsoft hacker was arrested yesterday on charges that he illegally sold a secret source code used for Windows NT 4.0 and Windows 2000 programs. The United States Attorney's Office in Manhattan charged William P. Genovese, Jr., 27, of Connecticut, with unlawfully distributing a trade sec...
Security's ongoing movement from a technology-dominated discipline to one that falls under the bailiwick of a company's CEO, CFO and COO is good news for Solutionary, a managed security service provider that views security as part of an overall business problem, rather than a gee-whiz technology. Th...
The Source Code Club is back in business, if you can call it that. The anonymous hacker group began peddling proprietary source code last July, disappeared, and now has reemerged with a bargain basement deal of US$24,000 for the source code for Cisco's Pix security firewall. "SCC is proud to announc...
In a possible reaction to hacker concerns, the Bush Administration has blocked at least some foreign visitor access to its official re-election site. The British Internet traffic analysis company Netcraft reported several locations have not had access to the site since Monday. A message that reads "...
With their bottom lines and corporate reputations at risk, many security professionals, tired of only being able to react to viruses, worms and compromised network performance are looking for ways to prevent degradation and infection. DeepNines Technologies has developed a scalable, platform-indepen...
Moving to shut down alleged purveyors of spyware before a slew of legislation aimed at curbing the practice can become law, the Federal Trade Commission (FTC) has targeted a New Hampshire man it says ran a spyware and pop-up advertising ring. The FTC filed a complaint in federal court in New Hampshi...
Ban
Regulate
Maintain status quo
Undecided
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/hacker-team.jpg
https://www.ecommercetimes.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
Hacker Nation: The World’s Third-Largest Economy
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/01/robot-on-keyboard.jpg
https://www.ecommercetimes.com/story/cybersecurity-expert-pegs-ai-as-online-shoppings-biggest-threat-177933.html
Cybersecurity Expert Pegs AI as Online Shopping’s Biggest Threat
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/ecommerce-smb-warehouse.jpg
https://www.ecommercetimes.com/story/optimize-your-amazon-presence-for-maximum-sales-success-177907.html
Optimize Your Amazon Presence for Maximum Sales Success
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/dating-app-smartphone.jpg
https://www.ecommercetimes.com/story/mozilla-waves-red-flag-over-data-hungry-dating-apps-179144.html
Mozilla Waves Red Flag Over Data Hungry Dating Apps
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/cashless-payment-cafe.jpg
https://www.ecommercetimes.com/story/mobile-payment-industry-innovations-driving-online-in-store-sales-177930.html
Mobile Payment Industry Innovations Driving Online, In-Store Sales
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/search-engines-smartphone.jpg
https://www.ecommercetimes.com/story/gartner-predicts-25-dip-in-search-volumes-by-2026-177921.html
Gartner Predicts 25% Dip in Search Volumes by 2026
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/online-shopper.jpg
https://www.ecommercetimes.com/story/temu-and-homary-online-retailers-that-are-generally-a-good-value-179105.html
Temu and Homary: Online Retailers That Are Generally a Good Value
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/AI-circuit.jpg
https://www.ecommercetimes.com/story/ai-no-longer-curiosity-for-retailers-but-key-to-better-business-report-177857.html
AI No Longer Curiosity for Retailers but Key to Better Business: Report
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/future-retail.jpg
https://www.ecommercetimes.com/story/the-future-of-gen-ai-in-retail-balancing-human-factors-with-revenue-growth-177923.html
The Future of Gen AI in Retail: Balancing Human Factors With Revenue Growth
Enter your Username and Password to sign in.
Social Media
See all Social Media