Microsoft on Monday reported that multiple malicious actors were taking advantage of vulnerabilities in its Exchange software last week to attack systems at organizations that have failed to patch the flaws. The company attributed the attacks "with high confidence" to Hafnium, a group believed to be state-sponsored and operating out of China...
Two things are happening simultaneously: The RSA Security Conference is in full swing and so is COVID-19. It's a strange juxtaposition. The conference is going on undeterred just a few blocks from where the mayor declared a state of emergency due to the ongoing spread of the virus. There's also topi...
Less than two months after publicly announcing that he was pulling out of the RSA Security Conference because RSA had accepted a $10 million contract from the NSA, F-Secure chief researcher Mikko Hypponen appeared somewhat mellowed. He alternated between criticizing RSA and offering an olive branch ...
The United States Department of Justice and the Federal Bureau of Investigation have hammered the Coreflood botnet, which its owners used to conduct cyberfraud on a massive scale. They have seized five command and control servers and 29 domain names registered in the United States, obtained a tempor...
When the former vice president of the United States gives a speech at a major technology conference in San Francisco, you'd expect to see a story about it the next day, or -- since it was a technology conference -- later on that same day. You'd see a run-of-the-mill story in the Chronicle or the Exa...
Unwilling to believe that resistance to a Microsoft takeover is futile, Yahoo is throwing a lot of strategies at the wall to see what sticks. Its latest effort is a trial advertising partnership with Google -- a two-week test of its AdSense service. Yahoo plans to run Google ads alongside up to 3 pe...
The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...
Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...
The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...
Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...
In a bid to further broaden its product offerings beyond core Internet gear, Cisco Systems said Thursday it would buy security software marker IronPort in a deal valued at $830 million. Cisco said the cash-and-stock purchase would enable it to extend its "self-defending network" approach to include ...
The Internet is still a very dangerous environment for conducting business. Lurking in the cyberspace shadows are criminal masterminds bent on stealing personal information and credit card numbers to further fund their activities. Almost daily, stories involving new worms, phishing scams or large s...
A malware-for-sale ring used to distribute customized copies of a data-pilfering Trojan has been cracked by two computer security firms. Panda Software of Glendale, Calif., and RSA Security of Bedford, Mass., "neutralized" several Web sites that were providing information thieves with customized ver...
Expect an unprecedented tsunami of excitement.
Look for a bigger surge of enthusiasm compared to recent Apple events.
Anticipate the typical level of interest sparked by a wave of Apple news.
With only a mild ripple of interest.
WWDC, yawn.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/russian-hacker-group.jpg
https://www.ecommercetimes.com/story/doj-five-eyes-nations-unite-to-dismantle-russian-cyber-espionage-network-178292.html
DOJ, Five Eyes Nations Unite To Dismantle Russian Cyber-Espionage Network
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/business-presentation.jpg
https://www.ecommercetimes.com/story/customer-analytics-now-a-pivotal-piece-of-the-retail-sales-puzzle-177486.html
Customer Analytics Now a Pivotal Piece of the Retail Sales Puzzle
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/retail-clothing-shoppers.jpg
https://www.ecommercetimes.com/story/how-brands-can-gear-up-for-a-possible-recession-in-2023-177368.html
How Brands Can Gear Up for a Possible Recession in 2023
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/04/Walmart-mobile-shopping-app.jpg
https://www.ecommercetimes.com/story/will-walmart-using-generative-ai-break-open-pandoras-retail-box-177549.html
Will Walmart Using Generative AI Break Open Pandora’s Retail Box?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/retail-checkout-counter.jpg
https://www.ecommercetimes.com/story/young-shoppers-in-stores-expect-easy-digital-payment-service-options-177460.html
Young Shoppers in Stores Expect Easy Digital Payment, Service Options
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/04/sales-force-team.jpg
https://www.ecommercetimes.com/story/intent-data-strategies-provide-a-lifeline-to-crm-176956.html
Intent Data Strategies Provide a Lifeline to CRM
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/supply-chain-shipyard.jpg
https://www.ecommercetimes.com/story/the-vital-role-of-tech-adoption-in-overcoming-supply-chain-hurdles-177001.html
The Vital Role of Tech Adoption in Overcoming Supply Chain Hurdles
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/05/Tidio.jpg
https://www.ecommercetimes.com/story/tidio-delivers-ai-crm-for-smbs-176983.html
Tidio Delivers AI CRM for SMBs
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/telehealth-provider.jpg
https://www.ecommercetimes.com/story/digital-health-care-flourishing-despite-legal-logistical-hurdles-177497.html
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
Enter your Username and Password to sign in.
Social Media
See all Social Media