Your are here:hacking technology > encryption decipher > Article list

Machine Check Point acquires data security and encryption of documents specialist liquidHits:1
Check Point Software, the takeover of the privately owned Str?, Mungsmaschinen announced a leader in data security. Liquid Machines Product To prevent abuse, Ver?modification, loss or theft of intellectual property and confidential...2010-08-20
Which laptop user, you need to protect your dataHits:1
The steady stream of advances in brute force decryption techniques - began when Russia, the first versions of Elcomsoft suite started your password?a recovery?public services, such as 18 months - means that laptop users now need to improve...2010-08-19
How to protect data when it is in your H?nd isHits:1
What you do not have laptops?They are powerful, connected, portable, has great?e graphics and sound - and does not cost much more than their desktop counterparts. Thus, there are extra?ar, that notebook sales grew 16% in 2009...2010-08-18
IT professionals are sensitive information on unprotected USB sticksHits:1
The data is encrypted in each mobile device?t implemented - such as laptops, handhelds, smartphones, USB drives, CD-DVD and other device?States, are they?equivalent of the Time bombsWaiting to explode in the face of the company -...2010-08-17
The news of encryption security is finally throughHits:2
A recent survey of Dynamics highlights free on increasing the complexity?t done by a simple computer-adept users are increasingly technical. Andy Cordial, Gesch?O insurance companies by Origin Storage best?, CONFIRM what we go?rt have to...2010-08-16
Organizations are planning to z the encryption on the mobile phone of mobile workforce?SelectHits:1
According to the survey Goode Mobile Security Intelligence (third) 40 percent of companies plan to use mobile data encryption. These organizations, one hundred percent also plan to encrypt the phones of mobile employees...2010-08-13
Four important steps to secure converged networksHits:1
The increasing convergence of multiple networks for voice, data, video and other services onto a single infrastructure based on Internet Protocol (IP), has the potential to leave serious gaps in security according...2010-08-12
The use of wireless networks of Informationsbl?ttern on the gr?SSSR risk of interceptionHits:2
According to the Ponemon Institute s Global 2009 Annual Study on Cost of a Data Breach, 32 percent of all data breach cases in the study involved lost or stolen laptop computers or other mobile data-bearing devices. While the average...2010-08-11
Communication World Cryptzone the receiver?Transceiver allows a secure e-mail on any device?t and evHits:2
Cryptzone Communication World, the newest addition to its L?solution for encrypting e-mail, secure e-mail to the receiver?Transceiver allows a secure e-mail messages to each device?t and every platform?. Open Global Communication has...2010-08-10
Viertgr??U.S. ten-payment Service Safety tension w?select merchants to-end encryptionHits:1
Elavon?, A wholly owned subsidiary of U.S. Bancorp, announced that the tension of the Security Council as part of a comprehensive Sicherheitsl?solution to offer to their commercial network Elavon selected?hlt was. Voltage...2010-08-10
OnSite Access Device Control-L?solution ensures that data is secure from software attacks, both physHits:2
Brivo Systems ACS 'Ger?te in the workplace?is an Access-L?solution with all the functions on the control of device?States with unrivaled integrated security based features. The OnSite appliance Trusted Platform Module (TPM), met with the...2010-08-05
HM Revenue and Customs loses computer discs containing the confidential details of 25 million childHits:4
Paul Gray, chairman of HM Revenue and Customs, has resigned following the loss of computer discs thought to contain the confidential details of 25 million child benefit recipients along with people's bank details. The resignation of Mr...2009-08-11
Doctors could be held responsible for the theft of their laptopsHits:4
The Information Commissioner has announced that doctors could be held responsible for the theft of their laptops if it can be proved they were negligent. This will enforce compliance with new data protection laws and ensure doctors...2009-08-11
Webroot Software merges with 'Software as a Service' security provider Email SystemsHits:17
Webroot Software, Inc. has announced that it has merged with Email Systems. Consequently, Webroot moves decisively into providing security SaaS solutions to enterprise organisations, particularly SMBs. Webroot...2009-08-06
Major security hole in Microsoft Windows 2000 operating system allows hackers to crack passwords andHits:5
A potentially serious flaw in Windows 2000 can apparently compromise emails, passwords, bank and card details typed in on a PC keyboard. A team of Israeli computer scientists have discovered a major security hole in the Microsoft Windows...2009-08-06

Home  <<Prev  6   7   8   9   10   11   12   13   14   15   16  Next>>  Last

Current Page:11 , Total 33 Pages, Every Page 15 Records, Total Records: 491

Hot Articles
Recommend Articles
New Articles
Sub category