High-growth countries are usually exhibited by a low per capita income. The upside, though, is that such countries, usually emerging countries, are able to do more with fewer resources. Dr Gilbert Saggia, Oracle Country Manager for Kenya, ...
Tags: Computer Products
There is a growing demand from consumers globally to gift, share and resell digital content and video games according to research findings unveiled today by WorldPay, a global leader in payment processing, risk and alternative payments. ...
Fingerprint scanning is a standard fingerprint method that authenticates a customer's identification based upon who they are. Even though verification using fingerprintsscanning machines to confirm details by using a different attribute, it ...
Tags: Biometric Fingerprint Scanner, Scanner, Fingerprint scanning
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer. The data is being incorporated into the company's biannual transparency ...
Tags: Google, Malware, Transparency, Web safer
LOOKING for a safe password? You can give HQbgbiZVu9AWcqoSZmChwgtMYTrM7HE3ObVWGepMeOsJf4iHMyNXMT1BrySA4d7 a try. Good luck memorising it. Sixty-three random alpha-numeric characters - in this case, generated by an online password ...
Tags: Password Fatigue, Computer Products, Consumer Electronics
Earlier this year, I wrote about how I considered the ICO's meagre £250,000 fine handed out to Sony for losing control of its servers and risking the theft of every man, woman and child's data on there as "a slap on the wrist". ...
Tags: Computer Products, software
All-day battery life is coming to the MacBook Air, Apple announced today during its World Wide Developers Conference. The new laptops use the latest processors from Intel, the fourth-generation Core processor known as Haswell ULT, and one ...
Microsoft is upping the security on Azure with Active Authentication, a new service now in preview which allows enterprises to secure access to hosted applications such as Office 365 with two-factor authentication. Active Authentication ...
Tags: Microsoft, Cloud, Two-Factor Authentication
Medical device makers should take new steps to protect their products from malware and cyberattacks or face the possibility that U.S. Food and Drug Administration won't approve their devices for use, the FDA said. The FDA issued new ...
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs. In comments to the South ...
Tags: NSA, Classified Data, Edward Snowden
Lenovo this week offered a peek under the covers on a new consumer cloud storage service called Lenovo Reach, which it said will allow users to securely access their cloud-based files and applications from any device via a single login ID. ...
Computerworld - A federal judge in Wisconsin has ordered a suspect in a child porn investigation to either provide prosecutors with the passwords to several encrypted storage devices of his that are thought to contain incriminating evidence ...
Tags: Decryption, Computer Products
If we ever needed a solution for identification scams (do the current issues with the online voting devices and the school entry examinations ring a bell?) then biometrics is here to fix a lot of issues. A handy scanning system is the most ...
BT, one of Yahoo's biggest customers for its Yahoo Mail service, has decided to dump the service in favour of its own BT Mail platform, which will be run by US messaging specialist Critical Path. Yahoo Mail accounts have been given ...
Tags: BT, Yahoo, Account Hijackings
If you’re worried that a disgruntled former coworker will hack your LinkedIn account and add embarrassing details to your resume, fear not: The social network for professionals has at last added two-factor authentication to prevent ...