Search Results

Results 1861-1880 of 1993 for Jack M. Germain

Lenovo Equips ThinkPad Notebooks With Disk Encryption

Lenovo announced this week that it is arming its ThinkPad notebooks with the ability to fully encrypt the hard drive to bolster security and reduce the risk of data theft ...

McAfee Launches New Security Strategy as Microsoft Loosens Grip

Several computer security companies are bolstering their efforts to remain viable players with enterprise computer users and consumers alike asMicrosoft loosens control over security access in its next-generation operating system, Vista ...

The False Promise of Browser Security

Internet users are under attack -- and what's more, there's no bulletproof defense against hackers on the horizon. Despite hype to the contrary from marketing departments at Microsoft, Apple andMozilla, Web browsers themselves -- not just the operating systems that run them -- are to blame for many security flaws ...

Security Firms Unveil On-Demand Biometric Authentication System

Biometric security providerUPEK announced onMonday a partnership with Internet security firmPay By Touch to bring an integrated biometric security service called "TrueMe" to online transactions ...

The Skinny on High-Def Formats

Autumn is here. That means the start of the holiday shopping season, the traditional time for electronics makers to introduce their new product lines. This buying season, consumers interested in one of the new high-definition DVD players being introduced over the next two months risk buying a player that may not be around very long. Remember the format war between the Betamax and VHS video tape machines in the late 1970s?...

PGP Ships New Encryption Tools

Enterprise data security firmPGP on Wednesday began shipping its new NetShare product, as well as major upgrades to its encryption and e-mail security line of policy enforcement and key data management software ...

The Cost of Doing Business in China

American corporations drawn to China's vast market of 1.3 billion people have to be prepared to jump through some regulatory hoops and adhere to a host of government censorship codes. Xinhua, China's state news agency, recently announced rules that require foreign media to get prior approval for the distribution of news, pictures and graphics within China. These rules prevent international financial information companies like Reuters and Bloomberg from selling their news services directly to Chinese banks, brokerages and other potential customers...

PRODUCT PROFILE

MX Logic Releases Web Defense Product for SMBs

MX Logic released on Monday a new managed security product giving small to medium-sized businesses new options in fortifying their computers against spyware, spam and viruses ...

Oracle Claims Strong Market Gains as Profits Surge

Oracle released its 2007 first quarter fiscal results late Tuesday showing soaring corporate profits that reflect considerable market share gains in the business management software field, according to the company ...

New Business Models Changing Online Auctions

EBay is an icon for online merchandising for both private sellers and small companies. However, industry watchers warn that user dissatisfaction over increased rates and its rules could give alternative auction Web sites more market share ...

INDUSTRY REPORT

Online Privacy Regulations Forcing Better Handling of Data

New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud ...

INDUSTRY REPORT

RFID Technology Faced with Privacy Considerations

Information technology experts warn that lingering security issues are making Radio Frequency Identification, or RFID, another uncontrolled tool for identity theft. RFID is an old inventory control technology that is quietly being deployed throughout business and industry to track everything from pets to people and products. This technology is helping optimize inventory and business systems and is making consumers' lives more convenient...

INDUSTRY REPORT

Threat From Mobile Device Viruses a Sleeping Giant

Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential ...

INDUSTRY REPORT

Adoption of Alternate E-Mail Security Technologies Pushed

The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming attacks ...

INDUSTRY REPORT

Combating ID Theft on the Internet

Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants ...

INDUSTRY REPORT

Consumers Remain at Great Risk from Spamming, Phishing

Spam-fighting strategies used by ISPs and consumers might be turning the tide against unwanted e-mail. However, innovative phishing scams continue to target both corporate users and consumers ...

INDUSTRY REPORT

E-Learning Capturing Market Attention

Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service their workers' job skills and reduce training costs...

SOFTWARE

Evil Twins a Menace to Wireless Security

Wireless Fidelity (WiFi) connections to the Internet provide business and personal users with near limitless computing convenience. However, unprotected wireless connections can be more damaging to corporate network security and user privacy than always-on cable connections without firewalls ...

INDUSTRY REPORT

Managing IM and E-Mail Threats in the Workplace

Security risks from instant messaging networks and spam-clogged e-mail inboxes are forcing corporations to finds ways to either limit employee access or clamp down with improved security ...

Scientist Blames Web Security Issues on Repeated Mistakes

Scientist Peiter "Mudge" Zatko makes his living anticipating and protecting users against the next generation of cyber threats. His problem is simple: When he talks, not everybody really listens ...

LinuxInsider Channels