- Welcome Guest
- Sign In
Lenovo announced this week that it is arming its ThinkPad notebooks with the ability to fully encrypt the hard drive to bolster security and reduce the risk of data theft ...
Several computer security companies are bolstering their efforts to remain viable players with enterprise computer users and consumers alike asMicrosoft loosens control over security access in its next-generation operating system, Vista ...
Internet users are under attack -- and what's more, there's no bulletproof defense against hackers on the horizon. Despite hype to the contrary from marketing departments at Microsoft, Apple andMozilla, Web browsers themselves -- not just the operating systems that run them -- are to blame for many security flaws ...
Biometric security providerUPEK announced onMonday a partnership with Internet security firmPay By Touch to bring an integrated biometric security service called "TrueMe" to online transactions ...
Autumn is here. That means the start of the holiday shopping season, the traditional time for electronics makers to introduce their new product lines. This buying season, consumers interested in one of the new high-definition DVD players being introduced over the next two months risk buying a player that may not be around very long. Remember the format war between the Betamax and VHS video tape machines in the late 1970s?...
Enterprise data security firmPGP on Wednesday began shipping its new NetShare product, as well as major upgrades to its encryption and e-mail security line of policy enforcement and key data management software ...
American corporations drawn to China's vast market of 1.3 billion people have to be prepared to jump through some regulatory hoops and adhere to a host of government censorship codes. Xinhua, China's state news agency, recently announced rules that require foreign media to get prior approval for the distribution of news, pictures and graphics within China. These rules prevent international financial information companies like Reuters and Bloomberg from selling their news services directly to Chinese banks, brokerages and other potential customers...
MX Logic released on Monday a new managed security product giving small to medium-sized businesses new options in fortifying their computers against spyware, spam and viruses ...
Oracle released its 2007 first quarter fiscal results late Tuesday showing soaring corporate profits that reflect considerable market share gains in the business management software field, according to the company ...
EBay is an icon for online merchandising for both private sellers and small companies. However, industry watchers warn that user dissatisfaction over increased rates and its rules could give alternative auction Web sites more market share ...
New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud ...
Information technology experts warn that lingering security issues are making Radio Frequency Identification, or RFID, another uncontrolled tool for identity theft. RFID is an old inventory control technology that is quietly being deployed throughout business and industry to track everything from pets to people and products. This technology is helping optimize inventory and business systems and is making consumers' lives more convenient...
Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential ...
The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming attacks ...
Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants ...
Spam-fighting strategies used by ISPs and consumers might be turning the tide against unwanted e-mail. However, innovative phishing scams continue to target both corporate users and consumers ...
Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service their workers' job skills and reduce training costs...
Wireless Fidelity (WiFi) connections to the Internet provide business and personal users with near limitless computing convenience. However, unprotected wireless connections can be more damaging to corporate network security and user privacy than always-on cable connections without firewalls ...
Security risks from instant messaging networks and spam-clogged e-mail inboxes are forcing corporations to finds ways to either limit employee access or clamp down with improved security ...
Scientist Peiter "Mudge" Zatko makes his living anticipating and protecting users against the next generation of cyber threats. His problem is simple: When he talks, not everybody really listens ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide