Securing Web applications is the No. 1 problem facing security professionals today. With 162 million Web sites in existence and millions more popping up each month, the sheer size of the problem is staggering -- not to mention the fact that nine out of 10 Web sites have serious vulnerabilities that ...
We live in a Web 2.0 world, but when it comes to fighting Internet-borne security threats, many enterprises are armed with only Web 1.0 weapons, according to a study released this week by San Jose, Calif.-based Secure Computing. Web 2.0 usage is prevalent in enterprises, the study found, and as a re...
Czech Republic-based IT security vendor Grisoft is buying Exploit Prevention Labs, an Atlanta company formed two years ago by security veterans Bob Bales and Roger Thompson. The deal, expected to close Dec. 31, will give users of its software better protection from Web 2.0-savvy cybercriminals than ...
More and more data center managers have begun implementing virtualization and server consolidation strategies in an effort to cope with the growing complexities they face today, according to a Symantec report released Tuesday. The survey also found that data managers must confront a plethora of chal...
IT industry titans including Microsoft and Symantec announced Tuesday at the RSA Conference Europe the formation of the Software Assurance Forum for Excellence in Code, or SAFECode, a non-profit organization solely dedicated to fostering greater trust in information technology products and services ...
This past July, a joint FBI/Chinese effort seized about $500 million worth of counterfeit Microsoft and Symantec software. The seizure and arrests came at a time when our government was pressuring China to do something about its traditional tolerance of software piracy. This was no small seizure and...
E-mail greeting card scams popular during the summer months seem to have lost their luster for information highwaymen. "We've seen an awful lot of greeting card malware in the last couple of months, but scammers have moved on to new techniques, simply because there was so much of it about that it st...
E-mail attachments are no longer used as frequently as before to infect PCs with malicious software, according to a report released Tuesday by malware fighter Sophos. The monthly report reveals that in August, on average, one in every 1,000 e-mails had an infected attachment. That compares with one ...
A data theft revealed over the weekend of some 1.6 million records from Monster.com does not raise issues of identity theft, the employment Web site asserted. "[T]here have been reports of this as an issue of 'identify theft,'" Monster Vice President of Compliance and Fraud Prevention Patrick W. Man...
A joint sting operation by the FBI and the People's Republic of China has netted more than half a million dollars' worth of counterfeit software, the FBI announced Monday. The unprecedented cooperative effort, code-named "Summer Solstice" and dating back to 2005, resulted in the arrest of 25 people ...
Credit card and ID thieves are turning to charities to help them validate credit card numbers, says computer security company Symantec. The drill involves making a small donation to a non-profit to see if the transaction is successful, described Symantec security response engineer Yazan Gable in a c...
Letting employees have unbridled access to free, consumer-level instant messaging applications running on their workplace computers is a security disaster waiting to happen. Instant messaging applications are easy targets for hackers taking advantage of vulnerabilities. It is critical for businesses...
Senders of unsolicited electronic messages, also known as spammers, are deploying a new generation of image spam to outsmart e-mail filters and other technologies designed to thwart them. They're cutting corners by linking their spam message to a photo from a popular image-hosting site, instead of s...
Enterprises continue to add to their data storage capacity, with external disk storage system sales up 5 percent in the fourth quarter of 2006 to $6.9 billion, according to a report released Monday by research firm IDC. IDC's Quarterly Tracker report on disk storage systems found the total disk stor...
Daily
Several times a week
Occasionally
Never
I can't tell when apps use AI
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/hacker-team.jpg
https://www.ecommercetimes.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
Hacker Nation: The World’s Third-Largest Economy
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/01/robot-on-keyboard.jpg
https://www.ecommercetimes.com/story/cybersecurity-expert-pegs-ai-as-online-shoppings-biggest-threat-177933.html
Cybersecurity Expert Pegs AI as Online Shopping’s Biggest Threat
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/ecommerce-smb-warehouse.jpg
https://www.ecommercetimes.com/story/optimize-your-amazon-presence-for-maximum-sales-success-177907.html
Optimize Your Amazon Presence for Maximum Sales Success
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/dating-app-smartphone.jpg
https://www.ecommercetimes.com/story/mozilla-waves-red-flag-over-data-hungry-dating-apps-179144.html
Mozilla Waves Red Flag Over Data Hungry Dating Apps
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/cashless-payment-cafe.jpg
https://www.ecommercetimes.com/story/mobile-payment-industry-innovations-driving-online-in-store-sales-177930.html
Mobile Payment Industry Innovations Driving Online, In-Store Sales
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/04/AI-content-generation.jpg
https://www.ecommercetimes.com/story/copyleaks-study-finds-explosive-growth-of-ai-content-on-the-web-179161.html
Copyleaks Study Finds Explosive Growth of AI Content on the Web
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/online-shopper.jpg
https://www.ecommercetimes.com/story/temu-and-homary-online-retailers-that-are-generally-a-good-value-179105.html
Temu and Homary: Online Retailers That Are Generally a Good Value
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/AI-circuit.jpg
https://www.ecommercetimes.com/story/ai-no-longer-curiosity-for-retailers-but-key-to-better-business-report-177857.html
AI No Longer Curiosity for Retailers but Key to Better Business: Report
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/02/future-retail.jpg
https://www.ecommercetimes.com/story/the-future-of-gen-ai-in-retail-balancing-human-factors-with-revenue-growth-177923.html
The Future of Gen AI in Retail: Balancing Human Factors With Revenue Growth
Enter your Username and Password to sign in.
Social Media
See all Social Media