Social proof is an individual influencer or group clout that gives "proof" to a product. It is based on the principle that people tend to follow and conform to an influential person or a majority. They do this to be validated -- a result of a need for safety. Here are 10 kinds of social proof strategies -- and how and why they work...
China has a new censorship tool that is causing alarm. It's known as the "Great Cannon." The University of Toronto's Citizen Lab identified the tool in a report released last week. The Great Cannon was first used in March, to launch a large-scale DDoS attack on GitHub and GreatFire.org, Citizen Lab ...
A week-old squabble between two Dutch groups -- the spamfighting Spamhaus Project and Web hosting service Cyberbunker -- has resulted in what has been called the largest distributed denial of service attack in Web history. The cyberfight reportedly has spilled over onto the global Internet and slowe...
An analysis of more than 400,000 apps in the Google Play store has revealed that more than 100,000 of them pose a potential security risk to their users. The analysis of the Android apps released last week by cyber security vendor Bit9 examined the security permissions requested by the programs. It ...
What would happen if you paid taxes or protection money but didn't get protected because your protectors themselves were getting clobbered? Worse still, what if they didn't tell you they had been compromised and that you might not be safe? That situation played out recently after yet another company...
Malware that appears to be similar to the highly toxic Stuxnet worm was made public Tuesday by security firm Symantec. Duqu, named for the "~DQ" file names it creates, appears to work as a remote access data-collecting program that uses some of the same infecting techniques as Stuxnet, the malware d...
The end of Thanksgiving means the beginning of holiday shopping season, and as usual, a great deal of that shopping will be done online. But while online shopping is easy and convenient, it's also fraught with dangers. Sure, it's easy to search the Web for the best price on that laptop or video gami...
The Stuxnet worm is one of the most sophisticated bits of digital malware security researchers have come across in a long time. Now, those researchers want to know where it came from. Was Stuxnet the product of a den of hackers working on their own accord, or did a national government somewhere in t...
Microsoft Windows doesn't have a good way to handle digital certificates that have been tampered with, Roel Schouwenberg, senior antivirus researcher at Kaspersky Lab, said Tuesday at the company's North American Virus Analyst Summit in San Francisco. One problem is that it doesn't clearly indicate ...
Many consumers are still afraid of shopping online, and it's not hard to see why, with reports of fraud, identity theft, data loss and other security breaches regularly making the news. The fact is, though, online shopping is safer than ever before, and new and emerging security technologies, method...
Yet more Web security flaws have emerged to threaten Internet users, who are already bedeviled by the likes of drive-by attacks, SQL injections and spam. At the Black Hat security conference in Las Vegas, researchers reportedly demonstrated serious flaws in the Secure Sockets Layer encryption protoc...
Back in January, friends of Seattle, Wash., resident Bryan Rutberg were stunned when they read e-mails from his Facebook account accompanied by his photo. In the messages, Bryan appeared to claim he was in big trouble and that he needed their help. At least one friend wired him money. However, Rutbe...
Facebook is adding support for OpenID to its Web site, allowing users access to the social media sign-on platform. Facebook is the standard's largest relaying party -- that is, the largest Web site accepting log-ins from OpenID. The move is beneficial to Facebook because a great many of its users ar...
The current economic environment has consumers tightening their purse strings, carefully scrutinizing each dollar they spend. Scaling back on expenditures, including investments, they're not taking any chances with the money they do have. There is little trust in the economy or the future. To get co...
Research has shown that the three most important factors influencing whether a customer will purchase from a consumer Web site are security and privacy, ease of navigation and quality of content. Make privacy and security information prevalent on your site and in the purchasing flow -- including bot...
I prefer to buy from my country or countries that mostly align with my principles.
I consider the country of origin, but price and quality are more important.
The country of origin has no influence on my buying habits.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/sad-teen-smartphone.jpg
https://www.ecommercetimes.com/story/waging-war-on-the-sextortion-epidemic-177981.html
Waging War on the Sextortion Epidemic
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/Saas-Platform-Developer.jpg
https://www.ecommercetimes.com/story/e-commerce-fraud-prevention-strategies-for-an-iffy-economy-177307.html
E-Commerce Fraud Prevention Strategies for an Iffy Economy
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/tiktok-iphone-app-store.jpg
https://www.ecommercetimes.com/story/despite-popularity-will-let-me-tiktok-that-become-a-fading-phrase-177303.html
Despite Popularity, Will ‘Let Me TikTok That’ Become a Fading Phrase?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/internet-user.jpg
https://www.ecommercetimes.com/story/tips-to-help-mask-your-identity-online-177846.html
Tips To Help Mask Your Identity Online
Enter your Username and Password to sign in.
Social Media
See all Social Media