- Welcome Guest
- Sign In
A real security threat is looming with wireless PDAs, WiFi devices and smartphones. These are the electronic marvels that are pushing the goal of wireless telecommunications to new limits. Industry watchers report that people are dropping their older PDAs like hot potatoes and snapping up the latest generation of wireless devices like crazy ...
A new worm that first materialized last Tuesday appeared in its third minor variant early this morning. The Sasser worm threatens any unprotected Windows computer tethered to the Internet via a broadband connection ...
In mid-March, BJ's Wholesale Club announced it was investigating a security breach that involved theft of credit card information from its computer network. Company officials ordered an exhaustive review of the retail outlet's state-of-the-industry technology systems with a leading computer security firm. ...
A new worm materialized yesterday in the U.S. Pacific region and was continuing a slow circulation across the U.S. mainland last night in search of compromised computer systems ...
Early warning last week about increased signs of a possible superworm in the making may have slowed down a new attack on the Internet. But evidence continues to grow, according to a VeriSign security officer, of a major new denial-of-service attack to be mounted from thousands of already-infected computer systems ...
An increase in suspicious activity this weekend has Internet security experts bracing for what some analysts warn could be the next big worm attack worldwide. Virus monitors spent the weekend watching an increased level of activity that experts said could be the start of a Blaster-like attack ...
Software can kill you. Don't think so? Talk to the family members of 21 deceased patients treated at the National Cancer Institute in Panama in November 2000. The cancer patients died after being overdosed by a Cobalt-60 radiotherapy machine. The technicians who entered patient and medication data into the software that guided that machine will stand trial starting May 18th in Panama City on charges of second-degree murder...
Despite aggressive tactics by U.S. agencies to crack down on illegal software warehouses, distribution of illegal software continues to rival legitimate software retail sales. Studies by industry watchdogs show that while worldwide software piracy has declined steadily from a rate of 50 percent to about 30 percent, the cost of piracy to software manufacturers remains about the same. By some estimates, that cost exceeds US$15 million per year...
Compare the vastness of the Internet with the microminiaturized world of subatomic structures, and you will get an idea of the potential that nanotechnology holds for industrial profit. Some analysts are predicting nanotechnology will become the biggest boost to the technology industry since the World Wide Web ...
A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks that would shut down the targeted Web site ...
Voice over Internet Protocol pioneers Skype, Vonage and other voice-communications purveyors have been quietly generating huge user bases online. Market analysts are reporting that VoIP services stand poised to displace conventional telecommunications pricing models. Given the success of improved VoIP technology, industry pundits wonder whether traditional telecommunications technology will adapt or be pushed aside...
If one thing is definite about Internet security and worm attacks, say experts, it is that cyber attacks are on the rise in 2004 ...
Imagine a war in which the combatants are invisible and the weapons they bear are hidden in trickery and stealth. Now picture that war being waged on a battlefield consisting not of desert fields but of thousands of ragtag computers in bedrooms, dens and corporate cubicles across America. The attacks in this war take place silently while Ma and Pa write e-mail to Johnny at college. Office workers huddled over their keyboards inadvertently join the fray with a daily onslaught of corporate e-mail exchanges...
James Van Dyke had a hunch last year that the commonly held belief that the Internet was causing an increase in identity theft and credit card fraud was not valid. Extensive research he conducted debunks many of the myths about the correlation between online activity and ID theft ...
With the growing demand for always-on high-speed Internet access, consumer-grade firewall boxes are becoming as common in computing as modems and mice. The prevalence of these devices makes sense, as network security and protection against intruders have become topics of great concern for home-office telecommuters as well as for IT staff in upscale corporations...
Microsoft officials are promising computer users more help in solving security threats that have plagued users of the company's best-known products. But Microsoft will rely on third-party vendors to provide at least some of the solutions. Microsoft announced its new strategies for securing its products in a series of low-key media advisories and keynote addresses earlier this month...
It seemed like a no-brainer for Microsoft: Use its massive software market share to win over game players to its Xbox console. It could sell a powerful, graphics-enhanced computer for about US$180 and sit back as the dollars rolled in from royalties paid by its partners for every Xbox game sold ...
Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the increasing spread of infected computers and organized crime ...
Radio Frequency Identification, or RFID, is an old technology that has been quietly revolutionizing business and industry. Back in World War II, the British used RFID signals to confirm the identity of their own aircraft in flight. Today, RFID has permeated our society. It is used to track everything from pets to prisoners to products ...
The power blackout that struck the northern United States and Canada in August shocked industry executives into acknowledging the need to upgrade outdated circuitry and power-generating equipment ...
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/08/millennial-couple.jpg
https://www.ecommercetimes.com/story/the-complex-implications-of-grinch-and-scalper-bots-beyond-the-holidays-177838.html
The Complex Implications of Grinch and Scalper Bots Beyond the Holidays
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/ChatGPT-smartphone.jpg
https://www.ecommercetimes.com/story/the-future-of-ai-in-retail-beyond-the-chatgpt-hype-177681.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/11/maximize-sales.jpg
https://www.ecommercetimes.com/story/the-power-of-bundling-to-maximize-sales-this-holiday-season-and-beyond-177847.html
The Power of Bundling To Maximize Sales This Holiday Season and Beyond
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/12/Zipline-drone-front-door-delivery.jpg
https://www.ecommercetimes.com/story/zipline-drone-delivery-projects-ready-for-takeoff-in-us-cities-178862.html
Zipline Drone Delivery Projects Ready for Takeoff in US Cities
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/woman-texting-diner.jpg
https://www.ecommercetimes.com/story/marketers-texting-schedule-can-make-or-break-consumer-engagement-177813.html
Marketers’ Texting Schedule Can Make or Break Consumer Engagement
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/01/smartphone-user-perplexed.jpg
https://www.ecommercetimes.com/story/affiliate-marketing-contributing-to-substandard-search-results-study-178978.html
Affiliate Marketing Contributing to Substandard Search Results: Study
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/11/package-deliveries.jpg
https://www.ecommercetimes.com/story/porch-pirate-product-protection-a-win-win-for-sellers-shoppers-177826.html
Porch Pirate, Product Protection a Win-Win for Sellers, Shoppers
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/10/shopping-card.jpg
https://www.ecommercetimes.com/story/many-merchants-worried-by-deadline-to-toughen-payment-card-security-177798.html
Many Merchants Worried by Deadline To Toughen Payment Card Security
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/unboxing.jpg
https://www.ecommercetimes.com/story/subscription-sales-spur-superior-selling-177636.html
Social Media
See all Social Media