A new spyware program called DigiKeyGen is luring the unwary with a claim to provide free access to online pornographic content. It's hardly a new tactic, but Panda Software Labs has discovered yet another instance of this time-tested social engineering ploy. DigiKeyGen is found on a Web page that a...
In a hack attack that reflects a worrisome trend in the education arena, Fairfield, Conn.-based Sacred Heart University in early May discovered that the security system on one of its computers containing students' personal data was breached. The university has not confirmed that sensitive files were...
Symantec on Friday began warning customers of a zero day vulnerability in Microsoft Word that is being exploited by hackers. The attack, which was reportedly discovered by VeriSign's iDefense, is successful against Microsoft Word 2003, according to Symantec. iDefense reports its testing shows the at...
During the last 12 months, nearly 20 percent of organizations have had employees launch a hacking tool or a keylogger within their network, according to new research released by Websense this week. That figure increased from 2005, when only 12 percent were impacted. A keylogger is one of the most da...
The number of malicious programs is on the rise, according to McAfee's Avert Labs, with exponential increases in rootkits and Windows-based stealth components. In the first quarter of 2006, the number of rootkits increased by 700 percent over the year-ago period, according to McAfee. Meanwhile, the ...
SophosLabs is warning computer users about Troj/Zippo-A, also known as Cryzip, this week, and offering the secret code to crack the scam. The Trojan horse encrypts computer data and attempts to extort a US$300 ransom. Zippo-A searches for files, such as Word documents, databases and spreadsheets, a...
Two new Trojan horses are being billed as "first-of-their-kind" bugs. Security alerts are warning of a "crossover" virus that leaps from one device to another; in addition, a new Java Trojan has been detected that could infect almost any cell phone. The Mobile Malware Researchers Association on Mon...
The U.S. Federal Bureau of Investigation has so far been most successful in its fight against cybercrime when it has involved major technology industry players. Cooperation between corporations and the feds must continue in order to keep up with ever-changing and evolving threats, FBI Director Rober...
Be especially wary of unsolicited e-mails claiming to contain obscene pictures and sex movies this week. The W32/Nyxem worm is set to trigger its data-destroying payload on February 3. The W32/Nyxem-D worm can spread via e-mail using a variety of pornographic disguises in an attempt to disable secur...
Academic officials from Oxford University and Harvard Law School announced Wednesday a plan to publish the names of "badware" senders in an attempt to thwart makers of malicious software such as viruses, worms, deceptive adware and spyware. The new initiative, StopBadware.org will also involve promi...
Microsoft is downplaying newly reported bugs in its Windows' graphic rendering engine. The software giant late Monday said security vendor reports about additional Windows Metafile flaws are actually nothing more than "performance issues." Specifically, Symantec warned users on Monday that three new...
Amid growing consumer concern and increasing media attention, Microsoft yesterday did something rather rare: It released an out-of-cycle patch. The company issued the fix for the zero-day Metafile vulnerability five days ahead of schedule. The hole is related to Windows metafiles, which are image fi...
A fervent debate over which operating system is safest for users has been raging for years, and it looks like the next chapter has begun, thanks to a report issued this week by the United States Computer Emergency Readiness Team (US-CERT). US-CERT's 2005 year-end index declared Unix/Linux logged mor...
As the security world awaits yet another Sober variant scheduled to attack today, Sophos revealed the top 10 viruses and hoaxes hindering businesses around the world during December 2005. Sober-Z is atop that list. Sober-Z took the world by storm in December, accounting for a massive 78.9 percent of...
It's not exactly a happy new year for millions of PC users exposed to a Microsoft Windows flaw that leaves the door wide open for hackers, Trojans, worms, spyware and other malicious attacks. F-Secure first reported the vulnerability on Dec. 27. Microsoft does not plan to issue a patch until Jan. 10...
Important to me so I can accept, deny, or customize my preferences before entering a website.
Inconvenient, but a fair exchange for knowing the website operator is likely serious about privacy and compliance.
An endless, unnecessary burden with a minimal effect that I wish was gone.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/sad-teen-smartphone.jpg
https://www.ecommercetimes.com/story/waging-war-on-the-sextortion-epidemic-177981.html
Waging War on the Sextortion Epidemic
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/01/teamwork.jpg
https://www.ecommercetimes.com/story/marketing-and-security-must-ally-to-eradicate-brand-impersonation-fraud-177292.html
Marketing and Security Must Ally To Eradicate Brand Impersonation Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/holiday-gift-card.jpg
https://www.ecommercetimes.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/internet-user.jpg
https://www.ecommercetimes.com/story/tips-to-help-mask-your-identity-online-177846.html
Tips To Help Mask Your Identity Online
Enter your Username and Password to sign in.
Social Media
See all Social Media