Consumer Security

Two cybersecurity bills approved this week by the U.S. House of Representatives pose a threat to citizens' privacy, according to opponents of the measures. Both bills, H.R. 1560 and H.R. 1731, aim to improve sharing of cybersecurity information between businesses and government agencies. "'Informati...

The U.S. Federal Trade Commission, which is at the forefront of regulating the impact of information technology on consumers, is bolstering its technical resource capabilities through a new Office of Technology Research and Investigation, or OTRI. The FTC is concerned about the failure of commercial...

After experiencing a data breach, most companies take a number of measures to strengthen security, including advising users to change their passwords and to make them strong. Although it stopped short of confirming that it was hacked or that any customer data had been exposed, Amazon-owned Twitch ...

Amazon on Thursday announced two new plans for unlimited storage in its Cloud Drive service. The Unlimited Photos plan includes 5 GB of additional storage for videos or other documents and files. It costs $11.99 per year. The Unlimited Everything option provides limitless cloud storage of photos, vi...

The way to permanently cure someone's headache is to cut off their head, and that appears to be the principle Yahoo has adopted with a new security policy announced Sunday. Users of Yahoo Mail no longer have to rack their brains to remember passwords, said Chris Stoner, director of product managemen...

EXPERT ADVICE

Mobile Wallets as Credit Card Killers

Google Wallet, bitcoin and other payment systems have spent years trying to oust the credit card as the be-all and end-all of payment methods. Publications and pundits everywhere have been quick to hail new technologies as "credit card-killers," and they're not without justification. As a payment me...

Identity thieves are using Apple Pay to defraud banks of what could amount to millions of dollars. Armed with iPhones, the fraudsters are entering stolen payment card information into Apple Pay. Due to weak authentication procedures at the institutions issuing the cards, they are able to use the sto...

SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by...

GOVERNMENT IT REPORT

FTC, Private Sector Lock Horns Over Consumer Data Protection

The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the Federal Trade Commission to continue penalizing commercial firms for failure to protect cons...

OPINION

How Eroding Trust Hurts Companies

I love all the innovation and trends in the wireless, telecom, television, Internet and tech space. However there is also a big warning light flashing ahead that no one is paying attention to...trust is eroding. Trust is a delicate thing and is being ignored. Innovation is great, but if we don't pro...

Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you g...

GOVERNMENT IT REPORT

FTC Argues Against IoT Law, For Now

The future explosion in e-commerce connectivity of all manner of electronic devices, sensors, and consumer products -- known as the Internet of Things -- will pose a major challenge to ensure that IoT data is secure and that personal privacy is protected. The global "installed and connected base" of...

"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that co...

GOVERNMENT IT REPORT

White House Jump-Starts Cybersecurity Protection Programs

As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for addi...

Millions of Net surfers use obvious passwords to log on to websites, but their numbers appear to be declining. SplashData on Tuesday published its annual list of the top 25 most common -- thus worst -- passwords leaked online. No. 1 was "123456," followed by "password" and "12345." Both "123456" and...

E-Commerce Times Channels