Systech International, a global technology leader in product safety, and consumer and brand protection, and Toppan, a leading integrated printing company and innovator in product packaging and security solutions, announced a strategic ...
Electronic packaging involves the use of engineering and other technologies to incorporate in-built security and protective features in the packaging of products. The use of electronics in packaging is gaining importance as it reduces ...
Tags: Electronic Packaging, Packaging
The use of gates is something that is not new but in fact it is used since years for lot of purposes. In the present scenario they are more than just a security product or a product that is used for blockage of water. Yes it's true and ...
The US National Security Agency (NSA) has been tapping the French phone system "on a massive scale", according to the latest revelations uncovered by NSA whistleblower Edward Snowden. The latest documents suggest that the NSA collected ...
Tags: Computer Products, software, webservice
Easing the path for organizations to launch big data-styled services, Red Hat has coupled the 10gen MongoDB data store to its new identity management package for the Red Hat Enterprise Linux (RHEL) distribution. "The beauty of Identity ...
Tags: Computer Products, software
Madico Window Films recently exhibited at the Global Security Asia tradeshow in Singapore, April 2-4. Tom Niziolek, Carl Kernander and Michael Lyons met up with William Ler from Lintec to participate in the event and highlight our ...
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy. Ad networks, ...
Tags: Mobile security vendor, Lookout
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online. ...
Tags: Researchers, Trading Software
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company's anti-malware technology with new mobile and system ...
Tags: Kaspersky Lab, IT security processes, corporate environment
Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company’s anti-malware technology with new mobile and ...
Tags: Kaspersky Lab, IT security processes, new mobile, anti-malware technology
Egress Software Technologies have recently announced that they have signed up to exhibit at Infosecurity Europe from 23-25th April 2013, this will be the first time Egress will be exhibiting at the event. Infosecurity Europe is the number ...
Tags: Egress Software Technologies, Infosecurity Europe, 2013
After several federal agencies said they will stop using BlackBerry devices and switch to iPhones, Research In Motion took the unusual step today of announcing a tough security certification for BlackBerry 10 in advance of the device's ...
Tags: BlackBerry devices, iPhones, Motion, FIPS
International escrow and assurance services provider NCC Group is to acquire US-based Matasano Security in £8.4m deal. Matasano is a US security testing services provider with numerous blue chip clients particularly in software, IT, ...
BlackBerry maker Research In Motion (RIM) has announced that its yet-to-be-launched BlackBerry 10 platform has been awarded the US government’s FIPS 140-2 security certification. The Federal Information Processing Standard ...
Tags: Blackberry, Consumer Electronics, US
DUBAI, UAE, December 22, 2012 /24-7PressRelease/ -- Less than eighteen months after introducing Sophos Mobile Control into its complete security product portfolio, the company today announced that more than one million devices worldwide are ...
Tags: Sophos, Mobile Device Management, mobile device, mobile security apps