Trend Micro unveils service to fend off identity thievesSecurity vendor last week unveiled a new security product that promises protection against identity theft.November 14, 2006 by Lynn Tan @ Redhat in Security
S'pore: Biometrics to secure daily purchases?Not until security and privacy issues are addressed, says NETS, the republic's electronic payments provider.December 8, 2006 by Lynn Tan @ Redhat in Security
Consumer convenience critical in security frameworkConsumer convenience should be a key consideration in improving the framework for digital security, says senior executive at security device maker Gemalto.April 17, 2007 by Lynn Tan @ Redhat in Security
Adobe: No threat from PDF spamNo hard evidence that PDF spam exposes users to security risks, claims the company, which nonetheless recommends user caution.August 15, 2007 by Lynn Tan @ Redhat in Security
Lexmark: Printers pose security threatCompany says end-point devices such as printers must not be overlooked if businesses are to ensure the security of their networkAugust 13, 2007 by Lynn Tan @ Redhat in Security
Top 5 ways to face a disasterBCP expert lists five key business contingency plans that every organization in Asia should have to deal with unplanned disruptions.March 6, 2007 by Lynn Tan @ Redhat in Security
Adobe: No threat from PDF spamThere is no hard evidence that PDF spam exposes users to any security risks, claims the companyAugust 16, 2007 by Lynn Tan @ Redhat in Security
ADRC unveils data recovery clinic in mallSingapore-based company launches the first data recovery clinic in a shopping mall to raise the awareness of data recovery.February 13, 2007 by Lynn Tan @ Redhat in Security
PDF spam not a threat: AdobePDF spam is more a nuisance than a security risk, according to Adobe, which claims there is "no hard evidence" where the junk e-mail has become a serious issue.August 16, 2007 by Lynn Tan @ Redhat in Security
Fingerprint scan favored in M'sia, S'poreMajority of Malaysians and Singaporeans prefer to use fingerprint authentication to prove one's identity, finds a Unisys study.May 8, 2007 by Lynn Tan @ Redhat in Security