Security

We live in a Web 2.0 world, but when it comes to fighting Internet-borne security threats, many enterprises are armed with only Web 1.0 weapons, according to a study released this week by San Jose, Calif.-based Secure Computing. Web 2.0 usage is prevalent in enterprises, the study found, and as a re...

Yahoo, eBay and PayPal are teaming up to improve protections against phishing attacks, the companies announced Thursday. The companies have adopted a new e-mail authentication technology, developed by Yahoo and known as "DomainKeys Identified Mail," that uses cryptography to verify the domain of the...

Google has added functionality from Postini -- its recently acquired on-demand security provider -- to Google Apps Premier Edition, further leveraging its ambitious acquisition and development platform. Google acquired Postini last month for $625 million in cash. The privately held company services ...

E-mail greeting card scams popular during the summer months seem to have lost their luster for information highwaymen. "We've seen an awful lot of greeting card malware in the last couple of months, but scammers have moved on to new techniques, simply because there was so much of it about that it st...

EXPERT ADVICE

How to Start a Company Without an IT Professional

Imagine a world in the not-too-distant future where anyone can work from anywhere, using whatever communication device they have at their disposal. This type of world is not hard for us to imagine. After all, many professionals are finding that they have less and less need to be in an office to get ...

A data theft revealed over the weekend of some 1.6 million records from Monster.com does not raise issues of identity theft, the employment Web site asserted. "[T]here have been reports of this as an issue of 'identify theft,'" Monster Vice President of Compliance and Fraud Prevention Patrick W. Man...

Cisco and Microsoft may be on a collision course in some areas, including the push to bring a single communications platform to businesses, but their CEOs said Monday the two companies will continue to work together to ensure their products remain compatible. Microsoft CEO Steve Ballmer and Cisco ch...

Do you remember the "Perfectly Normal Beast" from Douglas Adams' Hitchhiker's Guide series? If you haven't read about it, the Perfectly Normal Beast is a fictional creature -- kind of like a buffalo -- that migrates twice a year across the fictional "Anhondo Plain." It's -- ironically -- called "pe...

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. This new dependency on messaging has created a whole new spectrum of major risks, vulnerabilities and requirements for companies of all sizes. "Postini customers t...

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. Today, with more than 170 billion e-mails and 580 billion IMs exchanged daily, companies have seen a 334 percent annual increase in bandwidth, processing and stora...

WEEKEND FEATURE

Web Services Security: Beauty and the Beast

Lately, corporate interest in Web services has been rising -- and justifiably so. The advent of this new way of building applications promises to almost magically allow organizations to exchange information within their own systems with partners and customers. While the potential benefits are notewo...

Ask anyone what comes to mind when they think of TJX Companies, and they'll almost certainly mention the infamous data breach earlier this year that exposed more than 45 million customer credit and debit cards to hackers. That's the kind of publicity most companies can do without, but it's also the ...

For startup e-commerce companies, protecting customer data doesn't always come naturally. Small matters such as getting a business idea out of the starting gates and into the race -- not to mention winning those very first customers -- tend to overshadow the many liabilities associated with collecti...

Today's online shoppers may be more cautious than they were two years ago. Some are waiting up to 35 hours before completing a shopping cart transaction. A study of consumers' Internet buying habits suggests that online merchants face stiffer competition and new hurdles in closing sales over the Web...

Credit card and ID thieves are turning to charities to help them validate credit card numbers, says computer security company Symantec. The drill involves making a small donation to a non-profit to see if the transaction is successful, described Symantec security response engineer Yazan Gable in a c...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels