Security

Just how secure is your website? How tough is your webhosting provider's backbone? How vulnerable are you to cyberattacks like those that played havoc with Facebook and other sites in the past -- the victims of a rogue blogger? While no site is absolutely safe from assault, it pays to be vigilant ...

If I wanted to hack your e-commerce business, I'd have your help. It's a fact that no one runs a business from one location (or one computer) anymore. In today's world, work gets done everywhere -- in offices, in homes, in hotels, at airports, and while sipping mocha and siphoning Internet connectiv...

The email addresses and device IDs of more than 100,000 owners of 3G-enabled iPads have been exposed in a security breach, according to wireless provider AT&T. Victims apparently include at least one member of the U.S. President Barack Obama's cabinet, heads of large corporations and other promi...

The email addresses and device IDs of more than 100,000 owners of 3G-enabled iPads have been exposed in a security breach, according to wireless provider AT&T. Victims apparently include at least one member of the U.S. President Barack Obama's cabinet, heads of large corporations and other promi...

The email addresses and device IDs of more than 100,000 owners of 3G-enabled iPads have been exposed in a security breach, according to wireless provider AT&T. Victims apparently include at least one member of the U.S. President Barack Obama's cabinet, heads of large corporations and other promi...

Most security companies are big fans of the doom-and-gloom scenario of information security. However, when it comes down to brass tacks, security is nothing more than a business function -- specifically, a business function of measuring and mitigating risk. The key motivator behind information secur...

Things are looking bleak for McAfee after the security software company sent a bad virus definition to its users Wednesday. The file was created to combat a new threat, but once it was distributed, it caused thousands of PCs running Windows XP Service Pack 3 worldwide to crash. Many felt McAfee did ...

"Networks without Borders" are rapidly becoming the rule rather than the exception. The demand for all-access all the time, along with the rapid rise in remote and transient workers, has rendered network borders obsolete. Today's networks more closely resemble sieves than citadels. Gone are the days...

The Truth in Caller ID Act passed the U.S. House of Representatives on Wednesday. The bill aims to prevent misrepresentation of the called-from number on voice calls through any channel. Called "caller ID spoofing," the practice involves using various types of software to insert a name and number pe...

EXPERT ADVICE

IT Security Investments With Staying Power

In today's economic environment, the last thing a CIO wants to hear is that the IT security product his or her organization purchased last year isn't going to make the cut moving forward. Sometimes the product simply doesn't work with existing infrastructure or doesn't integrate well with establish...

EXPERT ADVICE

What Security Fears Cost E-Commerce

During this time of economic recovery, it seems that the Internet has remained fairly immune. E-commerce is on track to account for 53 percent of all purchases by 2014, according to Forrester Research. This represents positive growth, but when you put it into perspective based on the Internet's over...

U.S. District Judge Patti Saris sentenced computer hacker Albert Gonzalez to 20 years in prison for his role in stealing 40 million debit and credit card numbers that resulted in an economic loss of $200 million, according to the U.S. government's best estimate. The sentence closes what was the larg...

A new bill introduced in the Senate on Tuesday aims to put the United States in a leading role in the global fight against cybercrime. Dubbed the "International Cybercrime Reporting and Cooperation Act," the bipartisan legislation was introduced by Sen. Kirsten Gillibrand, D-N.Y., and Sen. Orrin Hat...

Google's relationship with the Chinese government officially entered the brinksmanship phase this week with the announcement from the company that it is ending its Communist-mandated censorship of search results and directing queries to its unfiltered Hong Kong-based service. The Great Firewall imme...

All new e-commerce businesses should address one vital question first and foremost: Will you collect and store payment card information on your Web site or offload credit card processing to a PCI-compliant merchant like PayPal? The answer to this question is paramount and should be well thought out ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels