Internet-based hacker attacks are being developed more quickly, becoming more sophisticated and are increasingly focusing on two high-profile targets -- e-commerce and Microsoft's Windows operating system -- according to a report from leading antivirus firm Symantec. In its "Internet Security Threat...
Got Insurance? If your business has a presence on the Internet, you had better have it. Traditional liability insurance will not be adequate, however. Loss of income and data plus lawsuits filed against your business are the expected consequences of hacker and virus attacks. These are potentially mo...
From the Sasser worms to phishing attacks, the Internet has been crawling with malware this year. Fortunately, there are people like Ken Xie who are ready to fight the good fight. As founder, president and CEO of network-protection firm Fortinet, Xie has seen more than his share of the techno-enemy...
Count Jonathan Bingham among those who weren't all that surprised by the reputed breach of security that may have resulted in Cisco's guarded Internet Operating System source code being pilfered and posted on the Web. It's not that Bingham, a former Forrester Research analyst who is now president of...
A virus that was first seen on May 22nd has been worming its way across the Internet, stealing personal information in the process. Dubbed "Korgo," the worm exploits the same vulnerabilities and spreads in the same way as the Sasser worm that caused havoc last month. Although the virus is not yet wi...
Police in Taiwan have arrested Wang An-ping, a 30-year-old man who reportedly admitted to authoring Trojan code later used to steal and destroy information on government-owned computers. The arrest marks the second major capture of the week in the information security enforcement arena. Also in cust...
Cisco Systems is investigating whether part of the source code that powers its networking hardware has been revealed on the Internet -- a potentially embarrassing development for a company making a huge push into the network security business. Reports swept the Web last weekend that the code had bee...
The pesky Netsky worm dogged Web computers during the month of March, accounting for 60 percent of all malicious e-mail tracked by antivirus firm Sophos. Five of the top 10 viruses tracked during the month, including all of the top three, were variants of Netsky. Some 15 versions of the worm were ac...
In the past year, enterprise networks have faced a plague of security issues. Now, many companies are finding themselves forced to channel more time and money toward improving security. From worms and viruses to compliance and patching issues, businesses must develop ever-more complex protocols to k...
They may not wear capes, carry futuristic laser guns or live in underground lairs, but members of Internet Security Systems' (ISS) X-Force team are accustomed to being summoned to work in the wee hours of the morning, on holidays and on weekends to fight crime and save the world -- or, at least, the...
Computer security experts thought the impact of MyDoom would fade on February 12th, as the program reportedly was designed to terminate itself on that date. Instead, MyDoom's creators are suspected of masterminding a new malware attack that started Monday. The new worm, Doomjuice, landed on every co...
A malicious program spread quickly across the Internet Monday, slowing down network traffic and potentially leaving electronic back doors open on individual computers. Known as MyDoom, Novarg and a variant of the Mimail worm, the infection usually appears as an e-mail error message. An attached exec...
Amid budgetary constraints, enterprise application snafus, and vendors that are slick with their PowerPoint presentations but AWOL with their implementations, the put-upon CIO has become as common a high-tech archetype as the teenage hacker or the jeans-clad, headstrong, bullying CEO "evangelist." W...
In the world of computer security break-ins, the focus has shifted from alleged hacker masterminds to enterprise shortfalls -- unpatched software, poorly secured firewalls and weak computer passwords. However, vulnerability assessment tools are educating IT admins about how to close holes in network...
When it comes to fighting traditional crime, tipsters play an integral role in reporting suspicious activities, questionable characters and true confessions. But while few people question the existence of Crime Stopper hotlines or highway billboards, Microsoft's recent plan to offer a bounty for inf...
Large corporations
Small businesses
Government agencies
Educational institutions
Non-profits
All equally
None of the above
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/hacker-team.jpg
https://www.ecommercetimes.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
Hacker Nation: The World’s Third-Largest Economy
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/01/robot-on-keyboard.jpg
https://www.ecommercetimes.com/story/cybersecurity-expert-pegs-ai-as-online-shoppings-biggest-threat-177933.html
Cybersecurity Expert Pegs AI as Online Shopping’s Biggest Threat
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/ecommerce-smb-warehouse.jpg
https://www.ecommercetimes.com/story/optimize-your-amazon-presence-for-maximum-sales-success-177907.html
Optimize Your Amazon Presence for Maximum Sales Success
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/dating-app-smartphone.jpg
https://www.ecommercetimes.com/story/mozilla-waves-red-flag-over-data-hungry-dating-apps-179144.html
Mozilla Waves Red Flag Over Data Hungry Dating Apps
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/cashless-payment-cafe.jpg
https://www.ecommercetimes.com/story/mobile-payment-industry-innovations-driving-online-in-store-sales-177930.html
Mobile Payment Industry Innovations Driving Online, In-Store Sales
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/AI-content-generation.jpg
https://www.ecommercetimes.com/story/copyleaks-study-finds-explosive-growth-of-ai-content-on-the-web-179161.html
Copyleaks Study Finds Explosive Growth of AI Content on the Web
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/online-shopper.jpg
https://www.ecommercetimes.com/story/temu-and-homary-online-retailers-that-are-generally-a-good-value-179105.html
Temu and Homary: Online Retailers That Are Generally a Good Value
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/AI-circuit.jpg
https://www.ecommercetimes.com/story/ai-no-longer-curiosity-for-retailers-but-key-to-better-business-report-177857.html
AI No Longer Curiosity for Retailers but Key to Better Business: Report
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/future-retail.jpg
https://www.ecommercetimes.com/story/the-future-of-gen-ai-in-retail-balancing-human-factors-with-revenue-growth-177923.html
The Future of Gen AI in Retail: Balancing Human Factors With Revenue Growth
Enter your Username and Password to sign in.
Social Media
See all Social Media