- Welcome Guest
- Sign In
It's a fact that might not bring a lot of comfort to consumers and businesses, but it's true: The methods for protecting e-commerce transactions haven't changed a great deal since online shopping became a viable option in the early '90s. SSL and TSL encryption are the protocols that slap on that lit...
It's a fact that might not bring a lot of comfort to consumers and businesses, but it's true: The methods for protecting e-commerce transactions haven't changed a great deal since online shopping became a viable option in the early '90s. SSL and TSL encryption are the protocols that slap on that lit...
It's a fact that might not bring a lot of comfort to consumers and businesses, but it's true: The methods for protecting e-commerce transactions haven't changed a great deal since online shopping became a viable option in the early '90s. SSL and TSL encryption are the protocols that slap on that lit...
The FTC has shut down an ISP that it painted as the worst of the worst in cyberspace. Pricewert, which has done business under a variety of names including "3FN" and "APS Telecom," sought out criminals seeking to distribute illegal electronic content including child porn, violent porn and bestiality...
As the business use of mobile devices such as laptops and smartphones proliferates, IT departments are scrambling to implement adequate security safeguards both inside and outside company walls. The cost of implementing security measures is problematic for many small-to-medium-sized enterprises, but...
As the frequent news reports of data breaches attest, maintaining data security is a tough row to hoe -- even for large enterprises. It's even harder for small and medium-sized businesses, which don't have the money or IT resources their larger counterparts have. The plethora of threats is daunting,...
As a growing number of enterprises transition to cloud computing, the use of the term "cloud" becomes more appropriate by the day. Just as natural clouds foreshadow weather events ranging from calm to stormy, cloud computing presents enterprise security professionals with a host of difficult challen...
In March, Visa announced that it was removing Heartland and RBS WorldPay, two credit card processors that had experienced major data breaches in the prior months, from its list of PCI-compliant companies. The action is seen by many in the industry as being mainly for show, but the removal of the pro...
A hacker -- or a group of hackers -- is attempting to hold hostage some 8 million records purportedly acquired from the Virginia Prescription Monitoring Program, according to ransom note posted to the program's Web site on April 30. Few statements have been released by Virginia state authorities, ot...
It's tax time again, and the online scammers are crawling out of the woodwork. Their goals are to intercept personal information about taxpayers nationwide, and in some ways, they may be benefiting from the IRS' push for people to electronically file their returns. Some scammers are "phishing" taxpa...
A bill introduced in the U.S. Senate would give the government dramatic new powers to regulate and enforce federal standards for cybersecurity. The government already monitors and regulates military networks, of course. However, the "Cybersecurity Act of 2009" would extend that control to private sy...
Data loss prevention has traditionally been considered an on-premise activity. Software as a Service, by definition, is not. However, DLP and SaaS represent major trends in email security with high visibility, and they are often driven by corporate initiatives and senior level decision makers. Simil...
Everyone knows cyber-crime is a cat and mouse game, usually involving a bit of social engineering to trick unsuspecting computer users into clicking a link, installing some software or providing valuable information. The latest trick in crooks' bags: "recession malware." This is a new generation of ...
Everyone's talking about Google's next big acquisition, but whether the company will actually make it is far from certain. The services the potential target offers are not quite in line with what Google does -- but then again, Google has never followed a straight linear product development road map....
In a time of economic crisis, there tends to be an increase in the number of people that turn to criminal activity. Although petty crime is usually one area that shows a significant upswing, an additional form of criminal activity on the rise is fraud. Before you can stop fraud, you need to know how...
Social Media
See all Social Media