Get the E-Commerce Minute Newsletter from the E-Commerce Times » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Apple's New Privacy Framework Pressures the Digital Ad Market
February 26, 2021
Apple's plan to release its App Tracking Transparency (ATT) privacy enhancement feature in early spring has set the ad industry on its ear. ATT requires apps to get a consumer's authorization before tracking them or the devices they are using. Ray Wang, principal analyst and founder at Constellation Research, told the E-Commerce Times that "at least 40 percent of consumers will say no."
Successful Phishers Make Slim Gains in 2020
February 24, 2021
Catastrophic events, like a pandemic, coupled with hasty technological change such as many people forced to work from home immediately, have been a rich environment in the past for phishers, who use deception to infect machines with malware, steal credentials, and invade corporate networks. However, malicious actors achieved only a marginal increase in success in 2020, according to a recent report.
Lessons Learned From the SolarWinds Supply Chain Hack
February 23, 2021
In a recent Linux Foundation blog post titled "Preventing Supply Chain Attacks like SolarWinds," the foundation's Director of Open Source Supply Chain Security, David A. Wheeler, adamantly pushed the need for software developers to embrace the LF's security recommendations. Given the magnitude of the SolarWinds hack, LinuxInsider asked Wheeler to dive deeper into how supply chain security standards might benefit from the LF's latest advice.
Silver Sparrow Malware Hatched on 30,000 Macs
February 23, 2021
Nearly 30,000 Macs have been infected with a new malware strain. Discovered by researchers at Red Canary, the malware has been sitting on it hosts waiting for a payload that never arrived. In a statement provided to TechNewsWorld, Apple said that upon discovering the malware, it revoked the certificates of the developer accounts used to sign the packages, preventing new machines from being infected.
How Biometric Authentication Methods Will Revamp the Commerce Experience
February 17, 2021
As they become more prominent, consumers will enjoy shopping experiences that no longer rely on payments from a piece of plastic with a four-digit pin. Instead, consumers will use unique motion sensors in smartphone devices to passively authenticate people using their walking behavior and other contextual biometric signals. Some of these contactless procedures are already being deployed.
The Future of Cybersecurity in 2021 and Beyond
February 16, 2021
Cybersecurity experts predict that in 2021 there will be a cyberattack incident every 11 seconds. This is nearly twice what it was in 2019, and four times the rate five years ago in 2016. The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
Hacker Attempts to Poison Florida City's Water Supply
February 10, 2021
A cyber intruder broke into the computer network of the water treatment system of Oldsmar, Fla. and attempted to poison it with lye. News of the attack was made public Monday by officials of Oldsmar, who revealed the attack was foiled by an operator at the facility within minutes of its launch. The Oldsmar plant provides water to businesses and about 15,000 residents.
Is 2021 the Year Cyberattacks Force Privacy Laws to Grow Some Teeth?
February 4, 2021
Cyberattacks are increasing in frequency, ramping up the data privacy threats they pose to government agencies and businesses alike. Governments both domestic and foreign need to step up efforts to pass legislation that bolsters technological defenses this year, warn privacy groups. Stiffer privacy laws are gradually being reviewed and signed into the U.S. market. But that process is mostly taking place at the state level.
Ubuntu Core 20 Brings Better Industrial IoT Control
February 2, 2021
Canonical on Feb. 2 made available Ubuntu Core 20. This new Ubuntu Core version boasts notable new device security innovations. Given the increasing numbers and sophistication of attacks by individual and state-sponsored cybercriminals, Canonical's efforts should be welcomed by both IoT device makers and their customers, according to Charles King, principal analyst at Pund-IT.
NYC Surveillance Cameras Targeted in Amnesty International Crowdsource Project
January 27, 2021
An online map of surveillance cameras in New York City is in the works. The map project is part of a larger campaign called "Ban the Scan," sponsored by Amnesty International, which is partnering on the initiative with several other tech advocacy, privacy, and civil liberties groups. Data for the map will be "crowdsourced" by volunteers.
Google Touts Alternative to Crumbling Third-Party Cookies
January 26, 2021
Google sent a shock wave through the advertising and publishing industries last year when it announced it planned to scrap third-party tracking cookies, which are an important tool for online marketers. Not to worry, the company announced Monday. It has a viable alternative in the wings. "FLoC" will be available for public testing with the March release of Chrome.
High Time for Cyberlaw Enforcement and a Future of Work Strategy
January 25, 2021
Huawei has events where it pulls together key analysts to focus on problems it thinks are critical to the future. At its last event, Huawei spoke about two areas that need considerable work. Let's talk this week about the need for centralized cyberlaw enforcement, and the need for a clear vision on the future of work. We'll close with the product of the week, a new 40" curved monitor from Dell.
Search Milestone Gives DuckDuckGo Something to Quack About
January 19, 2021
DuckDuckGo reached a significant milestone last week when it racked up more than 100 million searches in a single day. While still a paltry number compared to the more than five billion daily searches performed by Google, the milestone is a major one for the search engine that doesn't store any of its users' personal information, archive their search histories, or track their search activity.
3 Helpful Networking Projects for Your Raspberry Pi
January 18, 2021
In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi. It was upon casting a stray glance into the corner of my room where my Pi is, churning away on the previous task I assigned it, that I pondered all the loftier projects I have in mind for it.
Cloud Security Practices Playing Into Hands of Attackers
January 7, 2021
More than 80 percent of 650 cybersecurity and IT professionals surveyed by Check Point Software Technologies in July said their traditional security solutions either do not work at all, or only provide limited functions in the cloud. This indicates that organizations' cloud migrations and deployments are racing ahead of their security teams' abilities to defend against attacks and breaches.
FTC's Zoom Deal Signals Commitment to Security Enforcement
December 29, 2020
The U.S. Federal Trade Commission is making good on a resolution to strengthen its enforcement of security deficiencies occurring in e-commerce transactions. The agency's recent action involving allegations of improper activities by teleconferencing provider Zoom Video Communications is a notable example.
FTC Demands Social Media Firms' User Data, Harvesting Tactics
December 16, 2020
The Federal Trade Commission seeks to obtain information on how many users certain social media companies have, how active the users are, what the companies know about them, how they got that information, and what steps the companies take to continue to engage users. The FTC also is gathering information on the companies' business models and how they target children and families.
Get No-Fuss File-Level Crypto With Fscrypt
December 16, 2020
This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers multiple configuration modes.
Microsoft, Nintendo, Sony Issue Safe Gaming Manifesto
December 15, 2020
The Big Three makers of video gaming hardware have announced a united front to make online gaming safe for all their players. "We can accomplish more when we work toward the same goal, and so we will each continue investing in, evolving, and amplifying our approaches to user safety," stated Dave McCarthy, Microsoft's corporate vice president for Xbox operations.
Cyberthreat Hunter FireEye Hacked by Nation-State Attackers
December 9, 2020
Cybersecurity firm FireEye, which has been prominent in the fight against nation-state cyberthreats, has been itself attacked by "a highly sophisticated threat actor, one whose discipline, operational security, and techniques," company CEO Kevin Mandia announced Tuesday. This indicates the attack is likely state-sponsored, by a nation "with top-tier offensive capabilities."
'Scalper' Bots Hoarding Hottest Products from Consumers
December 9, 2020
During any holiday season, consumers have a tough time wrestling with each other for best-selling products, but now times have become even tougher, thanks to the proliferation of online "scalper" bots. These robot shoppers, unleashed by cybercriminals, emulate the activity of ticket scalpers in the real world.
'Tis the Season for Online Counterfeits
November 25, 2020
It should be prime time for shopping, but the pandemic has forced many consumers to tighten their purse strings. To help consumers -- and give e-tailers a heads up about better security -- the E-Commerce Times discussed holiday shopping issues with a panel of cybersecurity experts. They offered advice on how consumers can avoid buying counterfeit products; and analyses of how fake goods affect the broader retail market.
New Internet Protocol Aims to Give Users Control of Their Digital Identities
November 18, 2020
The @ Company wants to give you a more secure and human-centric Internet built on providing you with true ownership and control of your personal data. To that end, the company has launched an app built on its new privacy protocol. This new standard will attempt to change how online vendors and companies wheel and deal with the personal information of billions of Internet users.
DevSecOps: Solving the Add-On Software Security Dilemma
November 17, 2020
A report by open source security and license management company WhiteSource explores various factors contributing to the siloed software development culture and what steps are needed to achieve agile, mature, DevSecOps practices. TechNewsWorld discussed with David Habusha, vice president of product at WhiteSource, the state of DevSecOps in light of the report.
Zoom Beefs Up User Security With End-To-End Encryption
October 28, 2020
Zoom gave its users a big security upgrade Monday when it rolled out end-to-end encryption for its online meetings network. E2EE puts control of the keys for scrambling data in the hands of meeting organizers. Before the E2EE rollout, encryption was done on Zoom's servers, where someone with access to those servers could intercept the data. When used correctly, E2EE can make it difficult for even the best-resourced intelligence agencies to eavesdrop on communication.
Social Media Companies Top Data Grabber List
October 27, 2020
When it comes to an appetite for data, social media outfits are the most voracious, according to a recent study released by cybersecurity company Clario Tech. The analysis of nearly 50 of the world's biggest brands found that Facebook collects more than 70 percent of all the data it can collect legally about someone using its service.
The Trials and Tribulations of Paying Ransomware Hackers
October 23, 2020
There's no question that hackers are getting increasingly ambitious -- the average ransom demand increased from about $29,000 in 2018 to more than $302,000 in 2019. U.S. law doesn't prohibit paying ransom per se; but when victims pay monies to people or organizations who have been sanctioned by the U.S. government...they get into more trouble.
Whom Can We Trust to Safeguard Healthcare Data?
October 20, 2020
Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records have made it easier for bad actors to steal patients' highly personal information. Cybercriminals are further motivated by the fact that patient medical records are worth up to 10 times more than credit card numbers on the Dark Web.
Microsoft Squelches Trickbot Ransomware Network
October 13, 2020
An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could no longer be used to initiate new infections or activate ransomware already planted on computer systems.
Newest RoboLinux 11 Update Goes Far Beyond Typical Linux
October 11, 2020
RoboLinux is one of the most advanced desktop Linux distributions you can find. The latest release is even better, making it potentially THE best Linux variety available today for desktop users. The Oct. 9 release of RoboLinux 11.13 is an upgraded build of the project's Ubuntu-based distribution. But wait, there is a whole lot more to RoboLinux than just another Ubuntu-based retread.
See More Articles in Security Section >>
Which COVID-19 vaccine would you prefer to receive if offered to you today?
Johnson & Johnson
Moderna
Pfizer-BioNTech
I'll take any COVID-19 vaccine that is made available to me right now.
I'm not sure. I need more time to make an educated decision.
I'm not interested in getting a COVID-19 vaccine at this time.
Get your contact center ready step-by-step guide