Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Online Holiday Shopping Surges 15%

Mobile phones accounted for a larger share of the $36.4 billion consumers spent in November and December.

Best Mobile Apps For Busy Professionals
(click image for larger view)
Slideshow: Best Mobile Apps For Busy Professionals
Online holiday shopping roared ahead in 2010, as consumers spent 15% more than they did in the previous year. The growth was also fueled by consumers shopping using mobile phones in a big way for the first time.

MasterCard Advisors SpendingPulse said online retailers reported online sales of $36.4 billion between Oct. 31 and Dec. 23 versus the $31.5 billion that was reported in the same period last year. SpendingPulse, which measures various payment activities including online, cash, and check, said that apparel sales showed a big jump. Online apparel purchases hit 18.9% of total clothing sales this year, a 25.7% gain over last year's figures.

"This is the season of the sweater," SpendingPulse's VP for research and analysis Michael McNamara, told reporters. "What is driving this is that apparel sales online are doing well in general, represented by a shift from brick-and-mortar stores. The weather has helped, too."

Online retailer Amazon said its current Kindle model is the best-selling product in its history. Amazon bombarded its e-mailing lists with promotional offers, including free shipping, to the point that many were annoyed by the steady Amazon sales drumbeat.

In the end, everybody got into the act, from department stores and other large retailers, to traditional online shopping sites like Amazon and eBay. An Amazon mobile phone shopping app that allows shoppers to scan bar codes for pricing data helped consumers become more comfortable with ordering online with their cell phones. eBay's acquisition of app developer Critical Path Software helped the shopping and auction company attract more mobile phone users this year.

In recent years, consumers have used their mobile phones to find store locations and check pricing of items, but that has proved to be a double-edged sword for some large retailers, which are finding that some online shopping services are sending shoppers to discount sites where they can purchase items for less online than in their bricks-and-mortar stores.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4428
PUBLISHED: 2019-12-09
IBM Watson Assistant for IBM Cloud Pak for Data 1.0.0 through 1.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session....
CVE-2019-4611
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168519.
CVE-2019-4612
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to malicious file upload in the My Account Portal. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 168523.
CVE-2019-4621
PUBLISHED: 2019-12-09
IBM DataPower Gateway 7.6.0.0-7 throug 6.0.14 and 2018.4.1.0 through 2018.4.1.5 have a default administrator account that is enabled if the IPMI LAN channel is enabled. A remote attacker could use this account to gain unauthorised access to the BMC. IBM X-Force ID: 168883.
CVE-2019-19230
PUBLISHED: 2019-12-09
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.