Radio frequency identification (RFID) tags have been around since World War II, when the British Royal Air Force affixed tags to planes as a way to distinguish friend from foe, but it wasn't until 2003, when giant discount retailer Wal-Mart announced that it would require the tags on all shipments f...
New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud. Congress passed The Fair and Accurate Credit Transactions Act, known as FACTA,...
Information technology experts warn that lingering security issues are making Radio Frequency Identification, or RFID, another uncontrolled tool for identity theft. RFID is an old inventory control technology that is quietly being deployed throughout business and industry to track everything from pe...
At first glance, the proposal to create a new cyberspace red light district with the .xxx domain seems a clear win for legitimate businesses. The domain, which has been approved by the Internet Corporation for Assigned Names and Numbers, could essentially segregate adult-content and pornography, mov...
Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential. A Gartner report by securit...
The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming ...
Chief risk officers aren't just for banks anymore, but analysts say the position still is only necessary for certain companies. A position that first appeared in the financial services industry to deal with a bundle of compliance and security issues, chief risk officers, or CROs, are now spreading t...
Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. "The most prevalent ID theft threat is the phishing attack, and it is getting worse. Attacks...
Spam-fighting strategies used by ISPs and consumers might be turning the tide against unwanted e-mail. However, innovative phishing scams continue to target both corporate users and consumers. Users of file-sharing networks are particularly vulnerable to attacks, a new industry analysis warns. Accor...
Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service t...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.