Security

The U.S. government is moving quickly and aggressively to address cybersecurity vulnerabilities affecting both the federal government and the private sector. Information technology companies that are directly and indirectly involved in providing IT products and services to the federal government wil...

The impending loss of third-party digital cookies will soon force the e-commerce advertising industry to shift its strategies fast. These developments are issuing a real blow to advertisers seeking to leverage third-party data. At issue now is how brands will regroup from these substantial changes t...

Anyone with a stake in keeping ahead of cybersecurity assaults and enterprise network intrusions through API vulnerabilities can now tap into expert advisories and security reports. API security company Salt Security last week launched Salt Labs, a now-public forum for publishing research on API vul...

Shouldn't you get paid when businesses use your personal information gleaned from the internet? How much is your personal data posted online worth to you? Would you register your personal data so that you get paid when companies track you and use your own data to target you for ads? That is precisel...

Clients of SolarWinds, which experienced a high-profile data breach last year, are being targeted in a probe by the U.S. Securities and Exchange Commission, according to a Reuters report. "The impact of these large-scale breaches clearly has the potential to destabilize stock prices and the broader ...

A Russian-language dark web marketplace called Hydra that is known to facilitate the illegal sale of narcotics has seen cryptocurrency transactions soar over the last five years. According to a report by Flashpoint and Chainalysis, Hydra's crypto business began accelerating in 2017 after its chief c...

That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...

IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...

New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...

As the value of cryptocurrencies continue to soar, new investors are eager to get in on the action, and scammers are more than willing to accommodate them. According to the Federal Trade Commission, claims of losses from cryptocurrency fraud skyrocketed from October 2020 to March 2021. The median lo...

The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...

As cryptocurrency values continue to rise, cryptojacking becomes more attractive to cybercriminals. Now, a powerful hardware-based threat detection technology is being integrated into a Microsoft enterprise security product to help protect businesses from cryptojacking malware. The action integrate...

From coin shortages and curbside operations to contactless transactions, how consumers pay for their purchases has been completely transformed during the pandemic. Marketers expect that transformation to continue and expand. It is not just family staples that are seeing a jump in consumer digital pa...

Jonathan Cran, founder and CEO of Intrigue, a cybersecurity startup based in Austin, Texas, used his company's network security tools to compile a list of Fortune 500 companies still exposed to last month's Microsoft Exchange breach. Potentially, many of those companies may not know their networks a...

E-Commerce Times Channels