Technology has advanced so much over the years that it has become very difficult to stay upgraded with all the technological advancements. Technology is being used everywhere from your home to your office, schools, colleges etc. It is not ...
Tags: measure instrument, instrument
The Cyber Security Challenge (CSC) is not only about recruiting talent, but is aimed at raising awareness and widening the IT security talent pool, according to the competition's CEO, Stephanie Danan. Danan was responding to Computing's ...
Tags: Cyber Security, IT security, cyber
Internet Explorer's poor reputation for security is undeserved, with Mozilla Firefox actually the most vulnerable internet browser in common usage. That's according to research by network security solutions provider Sourcefire, which ...
General Dynamics is looking to bring U.S. government-level security to consumer smartphones, allowing organizations to benefit from the type of strong data protection only available on expensive and clunky mobile terminals. The company is ...
Tags: General Dynamics, consumer smartphone, data protection
Microchip has developed a capacitive contactless identification system that relies on near-field effects around the human body. A $1 fob or token, carried about a person, sets up a field that extends to the wearers fingertips, allowing ...
Tags: Body's Electric, Microchip, contactless identification system
IDG News Service - Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised. The attack comes two weeks after Twitter asked 250,000 of its users to reset ...
In a security landscape report released on Tuesday, security software maker F-Secure claimed that 2012 was the "year of the exploit". F-Secure, which focused on cyber threats during the second half of 2012, noted that the Internet has ...
Tags: security software, Internet, Web
The likes of Samsung, Apple, Nokia and RIM should be wary of firms that hold patents on technologies designed to exploit the use of 4G speeds, a lawyer has warned. John-Paul Rooney (pictured), partner and patent attorney at intellectual ...
Tags: 4G speeds, 4G mobile service, 4G netork
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
The British military could be exposed to cyber attack and a complacent government has failed to take preventative action to protect it. The failings could leave forces dangerously exposed in the event of war. That is the damning ...
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
The proper management of information security is one of the most important things that public organizations and private businesses should think of as the security of the company data is a major issue. The proper management of the ...
Tags: IT Security, Computer Products, Siscon
If having to pay $7+ per gigabyte for secure flash drives makes you blanch, take a look at the Lenovo ThinkPad USB 3.0 Secure Hard Drive. At only $200 for 750GBwhich translates to about 4GB per $1and PIN-pad security, it's a lot more ...
Tags: Lenovo, ThinkPad, USB 3.0, Secure Hard Drive
The technique of using algorithms to analyze footage from video surveillance cameras in real time began coming into its own five years ago. It's an intriguing adaptation of standard surveillance security. It's still an emerging market, as ...
Tags: technique, algorithms, video surveillance cameras, CSO
Intel researchers envision a future of driverless smart cars that can be updated at any time with the latest technology and apps. Intel hopes to play a major role in the new age, creating small, energy-efficient multi-core chips that can ...
Tags: Intel, driverless smart cars, technology, apps