Your are here:hacking technology > crack analyzes > Article list

Home > crack analyzes > Page 11
Biometrics alone is not enough to prevent fraudHits:1
Following US fraudster Frank Abagnale s criticism of the UK s ID card scheme, TSSI Systems agree that it does not go far enough to prevent impersonation. Abagnale made the comments in his opening address for the City IT and IT Security...2009-03-09
Drink and Drug Driving Campaign targets irresponsible and dangerous driversHits:1
A summer Drink and Drug Driving Campaign to target irresponsible and dangerous drivers has begun in all 43 police forces across England and Wales. This annual campaign targets drink and drug drivers to ensure we drive down casualties...2009-03-09
Mobile Network Operators face unique security challengesHits:2
Mobile Network Operators face some particularly unique challenges. They have all the normal concerns of a business dependent on IT, plus the added requirement that they must secure the network while making it widely available...2009-03-05
A quarter of law firms admit to losing confidential informationHits:1
According to a survey by Credant Technologies amongst 100 legal firms across the UK, 24% of UK legal firms have confessed to misplacing at least one mobile device containing confidential documents. These losses leave the data saved...2009-03-05
OCS Security provides 24/7 security support to Chill Factore real snow indoor ski resortHits:1
OCS Security is tackling the coolest security job in Britain after winning the contract to provide 24/7 support to the world s widest and the UK s longest real snow indoor ski resort. The contract, located at the 31 million Chill Factore...2009-03-04
UniKey Software Protection USB KeyHits:94
UniKey is an advanced software protection HID hardware USB Key that attaches to the USB port of a computer. UniKey is a driverless copy protection dongle meaning you need not install a driver. The operating system will install the driver...2009-03-04
Protecting your business from insider threatsHits:2
Business managers are aware of the dangers inherent within an organisation from disgruntled, or more likely just disorganised or unthinking employees. These insider threats can either open up the network to abuse from outside...2009-03-03
Councils supply householders with wireless CCTV spy cameras to catch nasty neighboursHits:3
Councils are supplying householders with covert spy cameras so that they can amass evidence against nuisance neighbours. The devices are so small they can be hidden in pot plants or door frames and provide 24-hour surveillance to capture...2009-03-03
Do not be guilty of network password malpracticeHits:1
The explosion of passwords in enterprises has created a sea of holes in the security infrastructure. Some CIOs have responded to the challenge by bringing in the lifeboats, figuratively speaking, but in many cases the...2009-02-28
Luminite launches wireless passive infra red detection systemHits:8
Luminite Electronics has launched Genesis, an exciting new wireless solution. Costing less than traditional solutions, this new PIR offers a range of advanced and innovative features and will meet the requirements of the most demanding...2009-02-28
Network security threats: Cutting down false positivesHits:2
In the classic war movie The Dirty Dozen, Lee Marvin s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It s a near-impossible assignment. Any IT...2009-02-26
Central database on email phishing scams operational in July 2007Hits:1
The Anti-Phishing Group (APWG) has announced that a central database - The Incident Object Description Exchange Format (IODEF) - that allows organisations around the world to share information about new email phishing scams will be fully...2009-02-26
Germany gets tough on computer crimeHits:2
The German Parliament has ruled that many more categories of hacking are an illegal act and should be punishable like any other crime. It is now an offense to create, sell, distribute or even acquire so called Hacker Tools in order...2009-02-24
Benefits and weaknesses of different types of authenticationHits:1
The impact of the Internet over the last few years has meant fundamental changes in the way we access business systems. The network security perimeter has crumbled at all levels while the number of users wanting network access has grown....2009-02-24
Two-Factor Authentication and One-Time Password from Billion ElectricHits:4
Billion Electric Co. Ltd. has announced the BiGuard OTP, which combines strong Two-Factor authentication with dynamic One-Time Password. This improves access security to the corporate network for SMEs. BiGuard OTP is designed to complement...2009-02-20

Home  <<Prev  6   7   8   9   10   11   12   13   14   15   16  Next>>  Last

Current Page:11 , Total 25 Pages, Every Page 15 Records, Total Records: 364

Hot Articles
Recommend Articles
New Articles
Sub category