|
Biometrics alone is not enough to prevent fraud | Hits:1 |
Following US fraudster Frank Abagnale s criticism of the UK s ID card scheme, TSSI Systems agree that it does not go far enough to prevent impersonation. Abagnale made the comments in his opening address for the City IT and IT Security... | 2009-03-09 |
Drink and Drug Driving Campaign targets irresponsible and dangerous drivers | Hits:1 |
A summer Drink and Drug Driving Campaign to target irresponsible and dangerous drivers has begun in all 43 police forces across England and Wales. This annual campaign targets drink and drug drivers to ensure we drive down casualties... | 2009-03-09 |
Mobile Network Operators face unique security challenges | Hits:2 |
Mobile Network Operators face some particularly unique challenges. They have all the normal concerns of a business dependent on IT, plus the added requirement that they must secure the network while making it widely available... | 2009-03-05 |
A quarter of law firms admit to losing confidential information | Hits:1 |
According to a survey by Credant Technologies amongst 100 legal firms across the UK, 24% of UK legal firms have confessed to misplacing at least one mobile device containing confidential documents. These losses leave the data saved... | 2009-03-05 |
OCS Security provides 24/7 security support to Chill Factore real snow indoor ski resort | Hits:1 |
OCS Security is tackling the coolest security job in Britain after winning the contract to provide 24/7 support to the world s widest and the UK s longest real snow indoor ski resort. The contract, located at the 31 million Chill Factore... | 2009-03-04 |
UniKey Software Protection USB Key | Hits:94 |
UniKey is an advanced software protection HID hardware USB Key that attaches to the USB port of a computer. UniKey is a driverless copy protection dongle meaning you need not install a driver. The operating system will install the driver... | 2009-03-04 |
Protecting your business from insider threats | Hits:2 |
Business managers are aware of the dangers inherent within an organisation from disgruntled, or more likely just disorganised or unthinking employees. These insider threats can either open up the network to abuse from outside... | 2009-03-03 |
Councils supply householders with wireless CCTV spy cameras to catch nasty neighbours | Hits:3 |
Councils are supplying householders with covert spy cameras so that they can amass evidence against nuisance neighbours. The devices are so small they can be hidden in pot plants or door frames and provide 24-hour surveillance to capture... | 2009-03-03 |
Do not be guilty of network password malpractice | Hits:1 |
The explosion of passwords in enterprises has created a sea of holes in the security infrastructure. Some CIOs have responded to the challenge by bringing in the lifeboats, figuratively speaking, but in many cases the... | 2009-02-28 |
Luminite launches wireless passive infra red detection system | Hits:8 |
Luminite Electronics has launched Genesis, an exciting new wireless solution. Costing less than traditional solutions, this new PIR offers a range of advanced and innovative features and will meet the requirements of the most demanding... | 2009-02-28 |
Network security threats: Cutting down false positives | Hits:2 |
In the classic war movie The Dirty Dozen, Lee Marvin s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It s a near-impossible assignment. Any IT... | 2009-02-26 |
Central database on email phishing scams operational in July 2007 | Hits:1 |
The Anti-Phishing Group (APWG) has announced that a central database - The Incident Object Description Exchange Format (IODEF) - that allows organisations around the world to share information about new email phishing scams will be fully... | 2009-02-26 |
Germany gets tough on computer crime | Hits:2 |
The German Parliament has ruled that many more categories of hacking are an illegal act and should be punishable like any other crime. It is now an offense to create, sell, distribute or even acquire so called Hacker Tools in order... | 2009-02-24 |
Benefits and weaknesses of different types of authentication | Hits:1 |
The impact of the Internet over the last few years has meant fundamental changes in the way we access business systems. The network security perimeter has crumbled at all levels while the number of users wanting network access has grown.... | 2009-02-24 |
Two-Factor Authentication and One-Time Password from Billion Electric | Hits:4 |
Billion Electric Co. Ltd. has announced the BiGuard OTP, which combines strong Two-Factor authentication with dynamic One-Time Password. This improves access security to the corporate network for SMEs. BiGuard OTP is designed to complement... | 2009-02-20 |
|