CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Holiday Shopping
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Holiday Shopping

Close up of woman hands with, gifts, coffee cup and laptop showing cybersmart when holiday shopping
Cyber SecurityInsights

How To Be CyberSmart This Holiday Shopping Season

November 24, 2021
As we approach the holiday shopping season, specifically large online retail events like Black Friday and Cyber Monday, consumers must be on high alert for cybercriminals who will also be looking to capitalize on such events. Here are some simple tips all shoppers should consider following and implementing.
Read More
Department store for fashion showing online threats during holiday shopping season
Cyber SecurityNews

Online Threats Targeting Unprepared Retailers Ramp up Dramatically During the Holiday Shopping Season

November 25, 2019
Retail industry is one of the worst-prepared for cyber attacks, yet is also one of the most heavily targeted by online threats during the holiday shopping season.
Read More
Woman smile and point finger on mobile app showing cyber threats during holiday shopping
Cyber SecurityInsights

Retailers Push Mobile Holiday Shopping as Cyber Criminals Capitalize on App Insecurity

December 18, 2020
Without securing their mobile apps, any mishandling of customers' sensitive information during the holiday shopping season could haunt retailers for months and years to come.
Read More
Close up of woman hands with credit card, gifts, and laptop showing Grinch bots during holiday shopping
Cyber SecurityNews

US Legislators Look To Stop “Grinch Bots” From Ruining the Holidays

December 6, 2021
Grinch bots have been a problem in the retail space for years and even beyond the Christmas season, snapping up everything from concert tickets to new video games.
Read More

Latest

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

Silhouettes of engineers working in blurry data center showing privacy challenges

The Privacy Triangle: Emerging Privacy Expectations and Challenges

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results