Security

Entrepreneurs might well be the latest heroes in cyberwarfare. Despite increasing odds of malicious attacks, SMB owners are forging ahead with a newfound sense of security. Untangle's fourth annual SMB IT Security Report shows that SMBs have adapted to a changing work environment, addressed an influ...

Privacy spending has increased significantly over 2020, with the average privacy spend amounting to $873,000 and the median budget $330,000.

During Facebook's most recent earnings call, Sheryl Sandberg, chief operating officer of Meta Platforms, which operates Facebook, acknowledged that Apple's actions had created some "headwinds" for the social network which, by some estimates, depends on targeted advertising for 98 percent of its reve...

A new fraud ring called Proxy Phantom is using sophisticated credential stuffing attack methods to take over customer accounts for U.S.-based e-commerce merchants.

While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...

Shopper discontent with online retail sites is localizing to two major concerns. Spoiler alert: customer experience per se is not in this ranking. It is the need for caution that prominently leads shoppers to abandon their shopping carts. Results of a recent survey of more than 1,100 respondents con...

Item tracker maker Tile refreshed its product line Tuesday and announced it will be introducing a new ultra-wideband product in 2022. "With a longer finding range, louder ring and voice-enabled finding through Amazon Alexa and Google Assistant, we're making it even easier for people to quickly find ...

Shadow code -- third-party scripts and libraries often added to web applications without security validation -- pose risks to websites and jeopardize compliance with privacy regulations, according to new research conducted by Osterman Research for PerimeterX. Third-party code leaves organizations vu...

Automated bots operated by malicious actors are costing businesses an average of 3.6 percent of their annual revenue. For the 25 percent worst affected businesses, this equates to at least $250 million every year. Even more concerning is the time it takes to discover these attacks. On average, more ...

Imagine finding out that your neighbor's identity was stolen and their life savings cleaned out by criminals who entered through their 'smart' washing machine. Ridiculous, you say? Well, have you checked your home Wi-Fi network lately? You might have several connected household gadgets and other dev...

Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...

The hacker who stole US$600 million in tokens from a cryptocurrency platform last week has been offered a security job by the platform. Most of the money has been returned to the Poly Network, but more than $200 million in assets remains locked in an account controlled by the hacker, whom the crypto...

People are freaking out about reports of NSO Group's Pegasus surveillance tool being used to spy on journalists, political dissidents, and other opponents of regimes worldwide. It's disheartening, and worth discussing. But why are we shocked? In Pegasus' case, the game theory is clear: some company ...

Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...

E-Commerce Times Channels