Security

After experiencing a data breach, most companies take a number of measures to strengthen security, including advising users to change their passwords and to make them strong. Although it stopped short of confirming that it was hacked or that any customer data had been exposed, Amazon-owned Twitch ...

Amazon on Thursday announced two new plans for unlimited storage in its Cloud Drive service. The Unlimited Photos plan includes 5 GB of additional storage for videos or other documents and files. It costs $11.99 per year. The Unlimited Everything option provides limitless cloud storage of photos, vi...

ANALYSIS

Google Glass Should Stay Gone

Here we go again. Most everyone who thought Google Glass crossed the privacy line was happy when it appeared the new technology was being shelved. Not so fast. Executive Chairman Eric Schmidt says Google is not giving up on Glass. Like everyone else, I love new technology. However sometimes companie...

Facebook has launched Topic Data, a new service that reveals to advertisers the subjects users discuss, the brands and products they use, and the activities they follow. Marketers will be able to sift through data compilations of what users say about events, brands, subjects and activities. Facebook...

BlackBerry subsidiary Secusmart on Monday introduced the SecuTablet, a high-security tablet based on the Samsung Galaxy Tab S 10.5, at the CeBIT 2015 trade show in Dusseldorf, Germany. Developed in collaboration with IBM, the tablet targets national and international public sector markets and enterp...

The way to permanently cure someone's headache is to cut off their head, and that appears to be the principle Yahoo has adopted with a new security policy announced Sunday. Users of Yahoo Mail no longer have to rack their brains to remember passwords, said Chris Stoner, director of product managemen...

The ACLU earlier this week filed a lawsuit seeking to stop the NSA from indiscriminately snooping on U.S. Internet traffic. Using a technique called "upstream" surveillance, the NSA does a spinal tap of the Internet's U.S. backbone, which carries the communications of millions of Americans, the ACLU...

EXPERT ADVICE

Mobile Wallets as Credit Card Killers

Google Wallet, bitcoin and other payment systems have spent years trying to oust the credit card as the be-all and end-all of payment methods. Publications and pundits everywhere have been quick to hail new technologies as "credit card-killers," and they're not without justification. As a payment me...

Identity thieves are using Apple Pay to defraud banks of what could amount to millions of dollars. Armed with iPhones, the fraudsters are entering stolen payment card information into Apple Pay. Due to weak authentication procedures at the institutions issuing the cards, they are able to use the sto...

SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by...

Yahoo CISO Alex Stamos on Monday confronted NSA Director Adm. Mike Rogers over the United States government's plan to require built-in backdoors in hardware and software made by American companies. The exchange took place at the New America Foundation's cybersecurity conference. Building backdoors i...

GOVERNMENT IT REPORT

FTC, Private Sector Lock Horns Over Consumer Data Protection

The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the Federal Trade Commission to continue penalizing commercial firms for failure to protect cons...

Criminals using Carbanak malware have stolen up to $1 billion from 100 financial institutions in Russia, China, Germany and the United States, Kaspersky Lab has revealed. The gang is expanding operations to other countries. Kaspersky has advised financial institutions to scan their networks for intr...

TECHNOLOGY LAW CORNER

It’s Time to Investigate Cyber Insurance

Almost every day there are reports of cyberintrusions, attacks and related security breaches. If your company does not have the right insurance, it could be even more of a disaster. For example, according to regulatory filings, at the time of Target's cyberbreach in 2014, it had about US$100 million...

OPINION

How Eroding Trust Hurts Companies

I love all the innovation and trends in the wireless, telecom, television, Internet and tech space. However there is also a big warning light flashing ahead that no one is paying attention to...trust is eroding. Trust is a delicate thing and is being ignored. Innovation is great, but if we don't pro...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels