- Welcome Guest
- Sign In
Today's virus outbreaks are not as loud as the Code Red attacks of a couple years ago, but beneath the quieter computing landscape is a perilous push to turn the growing amount of personal computers and personal information into profit through cybercrime, the latest Threat Report from security firm ...
Phishing scams seeking to steal donations earmarked for Hurricane Katrina victims may have started a week ago, but security experts said to expect a spike in this fraudulent activity in the weeks to come. Scam artists often prey upon the sympathy for tragedy victims by sending out millions of spam m...
For the last year or so, online financial institutions and their IT consultants -- as well as consumer interest groups -- have focused on fixing security, adding authentication and encryption and other technologies to forestall scammers. But the phishing plague continues. Now, experts tell The E-Com...
Controversial plans in the U.S. and the UK to institute national identification cards as a way of curtailing identity theft will likely only lead to different versions of the same crimes, according to a researcher. The UK researcher also says that consumers will consider national ID cards to offer s...
As heart-wrenching images of devastation and despair from New Orleans and others parts of the Gulf Coast of the U.S. continue to rivet Americans from coast to coast, computer security experts are warning that scammers have already devised elaborate phishing attacks and other online scams meant to ta...
For many of us, the significance of the spam problem does not become a concern until it results in blocking of legitimate e-mails. Then the global -- and national -- problem of spam can instantly become an individual problem. The 2004 National Technology Readiness Survey estimated that spam costs th...
With more than 40 million recently compromised credit cards available to fraudsters, merchants are faced with the challenge of preventing the use of these cards on their Web sites. What once was considered a rather insignificant cost of doing business online, has become a highly organized and profit...
Just as there are precautions that you can take to retain access to e-mail privileges, there are methods which you can use to regain e-mail access. Some ISPs in the U.S. block all e-mail from IP addresses known to be responsible for spam or other forms of Internet abuse. If your ISP is not protectin...
Approximately 10 years old, the affiliate marketing industry is one of the newest in performance marketing. Legalities, best practices and associations are in their infancy stages. That said, affiliate fraud is rampant. Every morning I tackle the previous night's Filinet affiliate signups to run ...
In a move to extend its eTrust security management solutions portfolio, Computer Associates yesterday announced it has acquired e-mail security software vendor Qurb in an all-cash transaction. Terms of the deal were not announced. The acquisition adds spam-blocking capabilities designed to protect p...
Continuing to use its deep pockets to beef up its security posture through targeted acquisitions, Microsoft has said it would buy enterprise e-mail security firm FrontBridge and take a stake in antivirus firm Finjan that will give it the right to purchase patented technology from that company. Micro...
One of the long-feared results of Internet security problems -- its potential effect on consumer behavior and eventually, spending -- might be starting to materialize, according to a new report. The Pew Internet & American Life project says that a survey that it conducted found that 91 percent o...
It's one of the most popular uses of the Internet and something users do every day: They drop digital photos into e-mail and send them to friends and family. Such photos are often bandwidth hogs, a problem that Yahoo is attempting to address with its Photo Mail feature. The service uses the Yahoo Ma...
European consumers are being driven away from online banking and commerce by fears that their identities will be stolen and their financial resources raided by information highwaymen. Survey results released yesterday by Entrust, a publicly traded digital identity security firm located in Addison, T...
Putting its own anti-spam technology to work -- and possibly hoping to highlight its effectiveness -- Microsoft has begun to use Sender ID to divert questionable messages away from the e-mail inboxes of Hotmail account holders. Microsoft has begun verifying e-mail origins with its Sender ID framewor...
Social Media
See all Social Media