A perfect cybercrime storm is brewing, and two of the main ingredients are ransomware and the Internet of Things. Cybercrime has become an industry with all the operational trappings of any legitimate sector, McAfee Labs noted earlier this month. It has its own supply chain, market segments, service...
When the giant data breach at infidelity website Ashley Madison made headlines last month, the CEO of the site's owner was quick to claim the caper was an inside job. He had the attacker's profile and work credentials, Avid Life Media's CEO Noel Biderman told ace cybersecurity blogger Brian Krebs. T...
Infamous security researcher Sammy Kamkar last week demonstrated a gadget that can intercept wireless signals to unlock cars and garage doors. Kamkar showed off the device, which cost him just $32 to make, at the DefCon conference in Las Vegas. Dubbed "RollJam," the wallet-sized gadget works like th...
Having meaningful work is one of the biggest challenges for many people at the bottom of the employment ladder. In Outliers: The Story of Success, Malcolm Gladwell documented the multigenerational effect. The children of people who had meaningful work turned out to be more successful and advanced fu...
U.S. government agencies can significantly improve their ability to deal with cybersecurity problems by utilizing big data analytics. However, agencies are finding it difficult to fully benefit from these advanced analytical tools for a variety of reasons -- including dealing with the sheer volume o...
I love all the innovation and trends in the wireless, telecom, television, Internet and tech space. However there is also a big warning light flashing ahead that no one is paying attention to...trust is eroding. Trust is a delicate thing and is being ignored. Innovation is great, but if we don't pro...
I was one of the launch analysts for Windows 95, and the launch of that product is widely held -- including by Bill Gates -- as the company's pinnacle. No launch before or since ever came close to that launch, and I remain amazed that no one, including Apple or Microsoft, has ever really attempted t...
The United States Department of State on Sunday announced its unclassified email system has been breached, making it the fourth U.S. government organization to have fallen prey to hackers in recent months. The State Department took down its website and unclassified email system and reportedly used G...
Kaspersky Lab this week reported that criminals have been emptying ATMs and infecting them with malware dubbed "Tyupkin." About 50 machines have been infected in eastern Europe, and the attacks have spread to the United States, India and China, based on statistics culled from VirusTotal, Kaspersky s...
Walk into any electronics store and you will find antivirus software from companies like Norton, ESET, McAfee and Kaspersky. In the last few years, the risk has spread from our computers to our smartphones and our tablets. The next thing we will have to protect may be our cars -- and our lives could...
Europeans are relentlessly attacking Google: A German official called for its breakup, a French minister charged it was a threat to sovereignty, and a publisher compared it to a dragon, according to a report. Really? I would have thought the euro and the draconian austerity program needed to keep i...
Worried about the NSA spying on your smartphone? How about online hackers? Truth be told, the greatest threat to your confidential information is a lot closer to you -- namely, your partner. That's what a recent survey of more than 13,000 people in the United States revealed. Avast last week reporte...
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following ...
Future Tense Central and Etransfr have debuted Chadder, an app that sends private encrypted messages. The app is one of a growing number of security products built around encryption technology and touted as secure that hit the market following Edward Snowden's massive data dump revealing the extent ...
Purveyors of a notorious mobile banking Trojan have started targeting Facebook users to infect Android smartphones. The Net predators use a desktop Trojan to leverage a Facebook socializer to install banking malware on their phone, ESET malware researcher Jean-Ian Boutin discovered last week. The de...
Alphabet
Amazon
Apple
Meta Platforms
Microsoft
Nvidia
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/06/systems-control-operators.jpg
https://www.ecommercetimes.com/story/ai-hallucinations-can-become-an-enterprise-security-nightmare-178385.html
AI ‘Hallucinations’ Can Become an Enterprise Security Nightmare
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/business-presentation.jpg
https://www.ecommercetimes.com/story/customer-analytics-now-a-pivotal-piece-of-the-retail-sales-puzzle-177486.html
Customer Analytics Now a Pivotal Piece of the Retail Sales Puzzle
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/retail-clothing-shoppers.jpg
https://www.ecommercetimes.com/story/how-brands-can-gear-up-for-a-possible-recession-in-2023-177368.html
How Brands Can Gear Up for a Possible Recession in 2023
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/russian-hacker-group.jpg
https://www.ecommercetimes.com/story/doj-five-eyes-nations-unite-to-dismantle-russian-cyber-espionage-network-178292.html
DOJ, Five Eyes Nations Unite To Dismantle Russian Cyber-Espionage Network
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/04/Walmart-mobile-shopping-app.jpg
https://www.ecommercetimes.com/story/will-walmart-using-generative-ai-break-open-pandoras-retail-box-177549.html
Will Walmart Using Generative AI Break Open Pandora’s Retail Box?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/Amazon-Fulfillment-FBA.jpg
https://www.ecommercetimes.com/story/how-partner-agencies-help-sellers-survive-on-amazon-177575.html
How Partner Agencies Help Sellers Survive on Amazon
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/supply-chain-shipyard.jpg
https://www.ecommercetimes.com/story/the-vital-role-of-tech-adoption-in-overcoming-supply-chain-hurdles-177001.html
The Vital Role of Tech Adoption in Overcoming Supply Chain Hurdles
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/Tidio.jpg
https://www.ecommercetimes.com/story/tidio-delivers-ai-crm-for-smbs-176983.html
Tidio Delivers AI CRM for SMBs
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/telehealth-provider.jpg
https://www.ecommercetimes.com/story/digital-health-care-flourishing-despite-legal-logistical-hurdles-177497.html
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
Enter your Username and Password to sign in.
Social Media
See all Social Media