ForYourIrisOnly (FYIO) is a fast, easy-to-use, and secure biometric security application capable of replacing complex passwords with...
Showing results 1 to 20 of 40
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
With many commercial antivirus providers facing a shrinking market share as free software gain in popularity, observers advise that they will need to focus on marketing their level of protection and support.
Amid criticisms current privacy policies to protect users are lacking, industry watchers note tighter rules may do more harm, and what is needed is a holistic approach.
Industry insiders share key takeaways from past year and how these can guide companies' security strategies in evolving IT landscape.
Disallowing admin rights of employees' endpoint devices not realistic solution to preventing malware threats in today's self-service IT business climate, observers say.
East-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual...
HP will bank on integration of functionalities targeted at consumers and business users for its mobile operating system and build up ecosystem, exec says, adding developer interest is growing.
Onus of securing smart devices should not be on employees and education-only method will not work, executive says, noting security of smart devices is becoming as important as PC security.
Protect your Computer from Unauthorized access with Advanced Security Features and File/Data Encryption for Windows XP/Vista/7. The...
Following March breach and first related customer attack, vendor now extends SecurID replacement offer to organizations "focused on protecting intellectual property and corporate networks" to boost consumer confidence.
Crooks already using cloud services as platform for illegal activities, warn security players, who say service providers have role to play in preventing their services from being abused.
British Telecom says its home-working employee scheme helped improve productivity and hire talent without geographical limitations, while giving staff flexibility of balancing career with personal responsibilities.
Facebook and other companies can track when a member visits a National Health Services site for health advice, leading a U.K. MP to question why the NHS is sending user data to third parties.
The chipmaker has bought the anti-malware outfit in unexpected move into security software, saying the partnership will create breakthroughs in wireless mobility.
Advancement of IT security tools hasn't stopped users from putting themselves at risk, unwittingly or otherwise. Security experts highlight five most common risky habits they still see today.
Businesses need to invest in an enterprise social network as existing consumer-targeted services are viewed as not safe for work, say market players who offer tips on managing corporate social networks.
Countries such as Indonesia and the Philippines, which have seen increased adoption of Firefox, are at risk as Zeus 1.4 also targets Mozilla's Web browser, according to Trend Micro.
Having recently cracked an Infineon chip with Trust Platform Module, security researcher raises alert about microchip's widespread use and vulnerability.
Microsoft's free Security Essentials suite will help increase user awareness but its ineffectiveness will create false sense of security, says Symantec exec.
Faced with the thought of a USB drive, notebook PC or backup tape going missing, most IT managers look to some form of encryption as the first layer of defence. However, according to one storage security expert, that's largely a pointless exercise.
Microsoft has released a tool to law enforcement that helps get around the encryption provided by the company’s own BitLocker software, distributed in Windows Vista. PC World has an extensive article about Microsoft's COFEE -- Computer Online Forensic Evidence Extractor – which some 2,000 law enforcement officers have been using since last June.
update The investment, spread over five years, aims to fortify infocomm systems and boost the country's IT security competencies.