While enterprises may be on top of their security practices for the most part, data leakage as a result of end user misuse and abuse is something that might very well be flying under the radar. According to a newly released global study by Cisco, "The Challenge of Data Leakage for Business and Emplo...
International soccer celebrity David Beckham has joined the likes of the "naked wife," Britney Spears and tennis beauty Anna Kournikova as the basis of a computer virus ploy that entices users with explicit pictures. Instead of viewing pictures, users who click on an e-mailed link promising the pict...
Computer and Internet security experts were closely watching the development of a mysterious outbreak that appears to have used a new tactic against an old vulnerability to infect thousands, possibly millions, of Web servers, Internet sites and Microsoft's Internet Explorer browser users. The widesp...
Through the years, some malicious computer programs have come to be known as viruses. Dr. Fred Cohen, a principal analyst with market research firm Burton Group, coined the term when he was working as a graduate student at the University of Southern California in the early 1980s. "There was a resemb...
Computer attackers are among those discussing and dissecting exploit code for a recently disclosed, serious security gap in all newer versions of Microsoft Windows operating systems, following a pattern now familiar to victims of the SQL Slammer, Blaster, Nimda or Code Red viruses. And while past ex...
A major security vulnerability in Microsoft's Windows operating system has security experts concerned about widespread attacks even though Microsoft has issued a patch for the problem -- this time a security vulnerability in the widely used Abstract Syntax Notation (ASN.1) protocol. Microsoft, which...
ECT News Network's daily roundup of network security news from around the world. Today's top story: Some industry watchers say Radio Frequency Identification (RFID), an up-and-coming tracking technology, has the potential to become a threat to user identification security...
Despite red-alert headlines about hackers, worms and viruses, and despite the threat of identity theft and misappropriation of personal data, many home computer users have yet to invest in the first line of defense against external attacks: a firewall. "Currently, only about 55 percent of antivirus ...
Reinforcing the message that can be easily inferred from recent virus and worm outbreaks, security giant Symantec has reported that attacks on company computers -- up 19 percent to an average of 38 attacks per business per week -- increasingly are using a potent combination of disclosed security vul...
Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. Known as "Swen" or "Gibe,"...
ECT News Network's daily roundup of network security news from around the world
A widely anticipated threat materialized this week as a worm that exploits a Microsoft Windows flaw began infecting some of the millions of vulnerable machines around the world. Experts said the relatively simple "Blaster" worm -- also referred to as "LoveSan" -- was spreading at a steady pace Monda...
Nine days after Microsoft warned of a widespread Windows flaw, a program to exploit it has been published online by a group based in China, representing one of the shortest times between warning and worm. The exploit code, published by a group known as Xfocus, is not technically a worm itself, but i...
On paper, Symantec appears to be one of the hottest tech companies around. Propelled in part by users' need to defend against a rash of destructive and well-publicized computer worms like Code Red, Nimda and SirCam, its stock price has jumped 70 percent in the past year. Nonetheless, leading industr...
Extremely - Personalization is a must. Without it, there's little chance of earning my loyalty.
Relatively - Personalization is a plus, but I do consider other factors when deciding who gets my business.
Minimally - Personalization is now automated and commonplace. Brands must do more to make me feel special to earn my loyalty.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/cloud-services.jpg
https://www.ecommercetimes.com/story/inflation-triggers-retailers-to-reassess-saas-spending-176796.html
Inflation Triggers Retailers To Reassess SaaS Spending
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/cyberwarfare-3.jpg
https://www.ecommercetimes.com/story/holiday-season-sees-onslaught-of-ransomware-ddos-attacks-177544.html
Holiday Season Sees Onslaught of Ransomware, DDoS Attacks
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/multifactor-authentication-2.jpg
https://www.ecommercetimes.com/story/mfa-is-broken-heres-how-to-fix-it-177538.html
MFA Is Broken, Here’s How To Fix It
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/holiday-gift-card.jpg
https://www.ecommercetimes.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/student-computer.jpg
https://www.ecommercetimes.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
Enter your Username and Password to sign in.
Social Media
See all Social Media