An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be...
Well, the holiday season is upon us once again, and that means it's the beginning of what, for many geeks, is a time of unnatural, enforced, repeated and prolonged socialization. Yes, it can be an uncomfortable time for those of us who aren't perky, extroverted cheerleader-types, and we here at Linu...
The history of James Bond films is the history of our fascination with technology: booby-trapped briefcases, jetpacks, cars with machine guns and ejector seats, super-magnet watches, cars driven by remote control, acid-filled fountain pens, cars that become invisible, sharks with frickin' lasers...
Mirror, mirror, on the wall, who are the greatest geeks of us all? That question -- posed in an Australian iTnews article, "The Top 10 Greatest Geeks of All Time" on Monday -- sparked quite a discussion in the blogosphere last week, garnering more than 1,300 Diggs and 280 comments by Friday. Who was...
The scenarios jump right out of a Brad Thor or Vince Flynn technothriller novel: Terrorists, using the microblogging service Twitter in conjunction with Google Maps, cell phone video and global positioning system technology, stage an ambush on troops in Iraq or coordinate an attack in an American ci...
Microsoft has angered Chinese computer users with its latest antipiracy move. On Tuesday, during its Global Anti-Piracy Day, Microsoft turned Windows Genuine Advantage loose on the Chinese people. Other users worldwide are familiar with WGA, which famously labeled legitimate users as pirates and dis...
The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...
"Geekonomics is really about the economics of a technology ... and the positive and negative impact on us." That's according to David Rice, author of "Geekonomics: The Real Cost of Insecure Software." In his book, Rice discusses how software defects severely impact the U.S. economy and national secu...
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...
If you're a ninja assassin, a terrorist, an illegal street racer, or any other variety of violent outlaw, you shouldn't look to YouTube for training anymore; you won't find any there. The Google-owned video sharing site has revised its policies to specifically forbid videos that offer instructions o...
Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...
Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business...
IBM is increasing its arsenal against hackers with a new beefed-up blade server. The IBM BladeCenter PN41, announced this week, combines Deep Packet Inspection technology from CloudShield with IBM's other protection platforms to create a powerhouse against attacks. The system is designed specificall...
Dan Kaminsky, the security researcher who first sounded the alarm that the entire Internet was in grave danger due to a widespread vulnerability, has revealed in front of a packed audience at the Black Hat security conference the details behind the initial subterfuge -- and potential problems that c...
Alphabet
Amazon
Apple
Meta Platforms
Microsoft
Nvidia
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/03/customer-service-rep.jpg
https://www.crmbuyer.com/story/businesses-willing-to-pay-big-bucks-for-quality-customer-service-176918.html
Businesses Willing To Pay Big Bucks for Quality Customer Service
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/04/Walmart-mobile-shopping-app.jpg
https://www.crmbuyer.com/story/will-walmart-using-generative-ai-break-open-pandoras-retail-box-177549.html
Will Walmart Using Generative AI Break Open Pandora’s Retail Box?
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/03/business-presentation.jpg
https://www.crmbuyer.com/story/customer-analytics-now-a-pivotal-piece-of-the-retail-sales-puzzle-177486.html
Customer Analytics Now a Pivotal Piece of the Retail Sales Puzzle
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/02/smartphone-retail-price-check.jpg
https://www.crmbuyer.com/story/retailers-its-time-to-get-phygital-177351.html
Retailers, It’s Time To Get Phygital
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/05/smartphone-texting.jpg
https://www.crmbuyer.com/story/mobile-shopping-apps-linked-to-digital-wallets-a-loyalty-driving-duo-177650.html
Mobile Shopping Apps Linked to Digital Wallets: A Loyalty-Driving Duo
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/05/unboxing.jpg
https://www.crmbuyer.com/story/subscription-sales-spur-superior-selling-177636.html
Subscription Sales Spur Superior Selling
https://www.crmbuyer.com/wp-content/uploads/sites/4/2022/02/executive-thinking.jpg
https://www.crmbuyer.com/story/preparing-for-an-uncertain-economic-future-where-to-from-here-176931.html
Preparing for an Uncertain Economic Future: Where to From Here?
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/05/Amazon-One-palm-identity.jpg
https://www.crmbuyer.com/story/amazon-adds-age-verification-to-its-palm-reading-technology-177656.html
Amazon Adds Age Verification to Its Palm Reading Technology
https://www.crmbuyer.com/wp-content/uploads/sites/4/2023/03/Salesforce-Einstein.jpg
https://www.crmbuyer.com/story/salesforce-brings-generative-ai-to-crm-and-its-name-is-einstein-gpt-176898.html
Salesforce Brings Generative AI to CRM and Its Name Is Einstein GPT
Enter your Username and Password to sign in.
Social CRM
See all Social CRM