Microsoft on Monday reported that multiple malicious actors were taking advantage of vulnerabilities in its Exchange software last week to attack systems at organizations that have failed to patch the flaws. The company attributed the attacks "with high confidence" to Hafnium, a group believed to be state-sponsored and operating out of China...
Two things are happening simultaneously: The RSA Security Conference is in full swing and so is COVID-19. It's a strange juxtaposition. The conference is going on undeterred just a few blocks from where the mayor declared a state of emergency due to the ongoing spread of the virus. There's also topi...
Less than two months after publicly announcing that he was pulling out of the RSA Security Conference because RSA had accepted a $10 million contract from the NSA, F-Secure chief researcher Mikko Hypponen appeared somewhat mellowed. He alternated between criticizing RSA and offering an olive branch ...
The United States Department of Justice and the Federal Bureau of Investigation have hammered the Coreflood botnet, which its owners used to conduct cyberfraud on a massive scale. They have seized five command and control servers and 29 domain names registered in the United States, obtained a tempor...
When the former vice president of the United States gives a speech at a major technology conference in San Francisco, you'd expect to see a story about it the next day, or -- since it was a technology conference -- later on that same day. You'd see a run-of-the-mill story in the Chronicle or the Exa...
Unwilling to believe that resistance to a Microsoft takeover is futile, Yahoo is throwing a lot of strategies at the wall to see what sticks. Its latest effort is a trial advertising partnership with Google -- a two-week test of its AdSense service. Yahoo plans to run Google ads alongside up to 3 pe...
The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...
Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...
The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...
Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...
In a bid to further broaden its product offerings beyond core Internet gear, Cisco Systems said Thursday it would buy security software marker IronPort in a deal valued at $830 million. Cisco said the cash-and-stock purchase would enable it to extend its "self-defending network" approach to include ...
The Internet is still a very dangerous environment for conducting business. Lurking in the cyberspace shadows are criminal masterminds bent on stealing personal information and credit card numbers to further fund their activities. Almost daily, stories involving new worms, phishing scams or large s...
A malware-for-sale ring used to distribute customized copies of a data-pilfering Trojan has been cracked by two computer security firms. Panda Software of Glendale, Calif., and RSA Security of Bedford, Mass., "neutralized" several Web sites that were providing information thieves with customized ver...
Ability to fast-forward, skip commercials
Channels, programming matches my interests
Customer service, support from provider
Flexibility to cancel at my discretion
Has DVR, cloud or box
Overall cost
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/05/house-keys-computer-300x156.jpg
https://www.ecommercetimes.com/story/why-the-real-estate-industry-should-embrace-the-cloud-176661.html
Why the Real Estate Industry Should Embrace the Cloud
The Business Case for Clean Data and Governance Planning
Netenrich Introduces AI/ML Platform for Cloud Security
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/04/nft-1-300x156.jpg
https://www.ecommercetimes.com/story/finding-the-fun-in-non-fungible-e-commerce-176613.html
Finding the Fun in Non-Fungible E-Commerce
Cryptocurrency as a Hedge Against the Declining Dollar
Crypto 101: Data Privacy and Security on Cryptocurrency Platforms
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/exec-smartphone-300x156.jpg
https://www.ecommercetimes.com/story/digital-devices-of-corporate-brass-ripe-for-hacker-attacks-176860.html
Digital Devices of Corporate Brass Ripe for Hacker Attacks
Hackers Cast LinkedIn as Most-Popular Phishing Spot
PII of Many Fortune 1000 Execs Exposed at Data Broker Sites
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/05/sports-betting-apps-300x156.jpg
https://www.ecommercetimes.com/story/sports-betting-platforms-gambling-with-substandard-cx-176483.html
Sports Betting Platforms Gambling With Substandard CX
Appdome CEO on Mobile App Security: No Developer, No Code, No Problem
Gamifying EdTech Launches Learning to Loftier Levels
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/05/call-center-team-300x156.jpg
https://www.ecommercetimes.com/story/marketers-beware-floridas-mini-tcpa-176642.html
Marketers: Beware Florida's Mini-TCPA
How AP Automation Bolsters Supplier and Customer Relationships
How To Assess if Amazon Is Right for Your Brand
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/04/twitter-elon-musk-300x156.jpg
https://www.ecommercetimes.com/story/musk-masterminds-private-twitter-takeover-for-44-billion-176607.html
Musk Masterminds Private Twitter Takeover for $44 Billion
The Fascinating Dance Between Twitter and Musk
Forrester Pegs B2B Fraud, Cyber Insurance Complacency as Top Threats in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/digital-wallet-qr-code-300x156.jpg
https://www.ecommercetimes.com/story/whats-in-store-for-next-gen-digital-wallets-87451.html
What's in Store for Next-Gen Digital Wallets
US Shoppers Spent $1.7T Online During Pandemic, Another Trillion Forecast for 2022
Social Media Advertiser Musts: Multi-Platform Strategy, Automation
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/04/open-sign-300x156.jpg
https://www.ecommercetimes.com/story/2022-will-mark-retails-permanent-evolution-to-omnichannel-operations-176597.html
2022 Will Mark Retail's Permanent Evolution to Omnichannel Operations
More Transparency, Marketing Shifts Can Ease Supply Chain Strain
Social Commerce Trending Higher for Consumer Conversions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/04/cloud-server-300x156.jpg
https://www.ecommercetimes.com/story/nasuni-founder-andres-rodriguez-object-storage-offers-more-cloud-benefits-lower-cost-87474.html
Nasuni Founder Andres Rodriguez: Object Storage Offers More Cloud Benefits, Lower Cost
Banks, Fintech Hold Fate of Disappearing Dollar Technology
Looking for Love Online? Advice To Protect Your Wallet
Enter your Username and Password to sign in.
Social Media
See all Social Media