WinMagic Inc., the innovator in data security and encryption solutions, today announced it had been awarded a multi-country contract with one of the Big Four global Tax, Advisory and Audit firms housing over 140,000 employees globally. ...
Tags: WinMagic Inc, data security, encryption solution, software
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
More than half of office workers don’t follow their company’s IT security policies, or aren’t even aware of the policies, according to survey results collected by Xerox and McAfee. The joint data survey held by the two ...
Tags: Embedded Control software, IT security, malware, McAfee, Viruses, Xerox
It has been reported that detectives from the Police Central e-Crime Unit (PCeU) have arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users were targeted and led to believe ...
Tags: PCeU, ransomware, blackmail people
A North American seaport installation is using an integrated product combining video analytics with access control as part of its security solution. PureTech Systems Inc., manufacturer of video analytic software, has integrated its ...
Tags: access control, video analytic software, surveillance solution
The collaboration enables secure computing experiences and expands the security ecosystem Semiconducter firm AMD has partnered with chip maker ARM to build a platform security processor using ARM's Cortex-A5 TrustZone technology which ...
Tags: AMD, cooperation, online transaction
Cloud-based intelligence databases Customised risk tolerance Signature approach combined with local behavioral analysis Protecting systems offline File-scanning misses the big picture Read more about cloud and security Security continues ...
Tags: Cloud-based, intelligence databases, Security, anti-virus
Microtrace, the original taggant company and leader of the taggant technology evolution for over 26 years, announces the availability of the world's first multiple level security yarn — Microtaggant® Security Yarns. Easily ...
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
Identity and access management firm Enline has revealed the details of the security solution underpinning Virgin Media's new Wi-Fi service on the London Underground. The service itself went live in 72 stations by the time the Olympics ...
HM Revenue and Customs(HMRC)is implementing disk encryption as part of a laptop refresh programme following a pilot rollout using 300 laptops. HMRC will use Becrypt Disk protect,which has been certified by the CESG,the UK Government's ...
Tags: HMRC, encryption, Becrypt Disk protect, Becrypt
The UK national Cyber Security Challenge has launched another competition to test the ability of amateur cyber defenders to protect a simulated government IT system. The competition is designed and run by the government's communications ...
Tags: defend, government, cyber attacks
Innovative security products supplier,ESP,has extended its CCTV offering with the addition of the new PRO camera range which provides a dramatically increased picture resolution alongside image management features giving installers a ...
Tags: CCTV, PRO camera, security solution, DSP
The UK national Cyber Security Challenge has announced two new competitions to launch a risk analysis and policy development stream,looking at IP theft in mobile application development and motor racing. Cyber Security Challenge UK runs a ...
Tags: Cyber Security Challenge, UK, IP theft, Aston Martin