- Welcome Guest
- Sign In
While computer attackers are taking advantage of a recent vulnerability in Internet Explorer, Microsoft has yet to release an update that can patch exposed systems. However, there are workarounds that users can employ to protect their systems ...
Once again, computer attackers are taking advantage of a recent vulnerability -- this time an unpatched flaw in Microsoft's widely used Internet Explorer browser -- to have their way with vulnerable Windows machines through malicious programs known as Trojans ...
A looming October 14th deadline could result in a widening of SCO Group's legal assault on Linux and distributors of the open-source operating system as the Lindon, Utah-based company mulls plans to pull another Unix license, this time from SGI ...
Despite criticism of its technical and legal tactics, the Recording Industry Association of America is continuing its campaign of lawsuits against individual Internet file traders accused of copyright infringement ...
Reinforcing the message that can be easily inferred from recent virus and worm outbreaks, security giant Symantec has reported that attacks on company computers -- up 19 percent to an average of 38 attacks per business per week -- increasingly are using a potent combination of disclosed security vulnerabilities and complex computer worms to hit systems...
Calling it a "migration product" intended to take desktop users away from Windows and toward 64-bit computing and the new 2.6 Linux kernel, SuSE Linux has announced its 9.0 desktop update will be available next month ...
The list of legitimate alternatives to the music-trading networks that were used by nearly 60 million people last year grew larger this week with a new service from San Diego-based MusicMatch ...
State and federal law enforcement authorities have announced a second arrest related to a variant of the Blaster computer worm. Meanwhile, security experts are watching and waiting for another virus variant to take advantage of a similar security hole in Microsoft Windows systems ...
Apple this week released the latest source code for its Darwin open-source project -- Darwin 6.7 and 6.8 -- which corresponds to the Mac OS X operating system and its latest versions, 10.2.7 and 10.2.8. Version 10.2.8 was recalled this week by the Cupertino, California-based company because of a reported Ethernet problem ...
In the face of increasingly tougher state and federal law that includes fines as heavy as US$1 million and potential jail time, spammers are hitting back by attacking antispam Web sites known for assisting administrators in the fight against unwanted commercial e-mail ...
One of the Recording Industry Association of America lawsuits, launched this month against 261 accused illegal file traders, has been dismissed by the industry group, calling its technical tracking of alleged song swappers into question ...
Sending the unwanted e-mail solicitations known as spam to Californians likely will become a lot more expensive, thanks to a new law that will fine spammers and advertisers as much as US$1 million per incident. ...
In response to attacks on the Linux operating system launched by SCO, which claims its own Unix source code was incorporated into the open-source software, Hewlett-Packard is indemnifying its Linux customers against any potential SCO litigation ...
Internet search leaders Overture and Google both are testing services that deliver local results as they seek to bolster the already burgeoning market for Web searches ...
Beneath all the noise generated by the latest security holes in Microsoft's Windows operating system, experts have warned of two open-source security flaws that could allow intruders to corrupt memory, take control of systems and launch a denial-of-service (DoS) attack ...
Consternation over VeriSign's plan to redirect mistyped or nonexistent domain name requests has progressed to a call from the International Corporation for Assigned Names and Numbers (ICANN) to suspend the service and a US$100 million lawsuit from a company claiming damages from it ...
The Swen computer worm is turning out to be a bigger problem than earlier expected, using a brief head start on computer antivirus defenses, as well as complex abilities and an effective masquerade, to infect Windows machines and spread via e-mail to many users ...
Similar to the action toys of two decades ago, prototype ThinkPad notebooks from IBM can be transformed from the traditional notebook form factor to a disconnected desktop with a more comfortable keyboard and separate monitor ...
Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. ...
Widely used DB2 database software from IBM -- which often stores critical data, such as credit card information -- has flaws that would be "trivial" for attackers to exploit ...
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/04/AI-robot-in-business.jpg
https://www.crmbuyer.com/story/how-to-leverage-gen-ai-without-losing-the-corporate-shirt-179123.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/02/future-retail.jpg
https://www.crmbuyer.com/story/the-future-of-gen-ai-in-retail-balancing-human-factors-with-revenue-growth-177923.html
The Future of Gen AI in Retail: Balancing Human Factors With Revenue Growth
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/06/Gen-AI-chat.jpg
https://www.crmbuyer.com/story/is-generative-ai-the-next-big-cx-thing-despite-its-risks-177049.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/04/marketing-creators.jpg
https://www.crmbuyer.com/story/beyond-the-cart-ux-hits-and-misses-can-make-or-break-a-virtual-storefront-177960.html
Beyond the Cart: UX Hits and Misses Can Make or Break a Virtual Storefront
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/05/business-meeting-ideas.jpg
https://www.crmbuyer.com/story/morphing-demographics-require-imaginative-pr-strategies-178007.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/12/ecommerce-success.jpg
https://www.crmbuyer.com/story/5-ways-retailers-can-sell-more-online-with-a-personal-touch-177854.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/07/innovation.jpg
https://www.crmbuyer.com/story/a-new-era-of-customer-service-177218.html
https://www.crmbuyer.com/wp-content/uploads/sites/4/2024/05/computer-user-perplexed.jpg
https://www.crmbuyer.com/story/retailers-ignoring-customer-privacy-website-usability-put-business-at-risk-178009.html
Retailers Ignoring Customer Privacy, Website Usability Put Business at Risk
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/07/strategic-planning.jpg
https://www.crmbuyer.com/story/gong-ai-platform-delivers-improved-accuracy-to-revenue-forecasting-177228.html
Gong AI Platform Delivers Improved Accuracy to Revenue Forecasting
Social CRM
See all Social CRM