You Are Browsing ‘Security ’ Category

Comments Off on Google quietly added an insanely cool security feature to Android Lollipop
(Source: BGR) Even though some Android device makers have already rolled out devices with embedded fingerprint sensors that offer users addedsecurity ......
Comments Off on Federal Cybersecurity Framework Takes Shape
The federal cybersecurity framework released by the National of Institute of Standards and Technology in February was under development for a year; but the work didn’t stop with its publication. Since its release the private sector has been working hard to match their current and target cybersecurity practices to the framework. Not only has the White House said the framework is gaining traction among industry, it announced in a formal review...
Comments Off on Box Acquires Start-Up Subspace to Bolster Data Security

(Source: Nasdaq) Moreover, the deal will help the company to expand its reach in bigger companies where maintaining data security is an important task. ...

Comments Off on NCC Group to audit OpenSSL for security holes
(Source: ZDNet) OpenSSL, arguably the world's most important Web security library with its support for Secure Sockets Layer (SSL) and Transport Layer ......
Comments Off on Box Acquires Start-Up Subspace to Bolster Data Securit
(Source: Zacks.com) Cloud storage company, Box Inc. (BOX - Snapshot Report) recently acquired data security start-up, Subspace. Financial details pertaining to the deal have been ......
Comments Off on Why Google couldn’t live up to its mobile security promise
(Source: Washington Post) Last year, Google made a sweeping promise, saying that content stored on smartphones using the next version of its Android operating system, Lollipop, would ......
Comments Off on Good Technology Pioneers Enterprise Mobile Data Security in the Era of Wearables and the Internet of Things
(Source: PR Newswire) Good Dynamics enables security and protection of business dataaccessed by and stored on wearables and shared between other Good-secured apps. Good is ......
Comments Off on Anatomy of a certificate problem – Comodo’s “PrivDog” software in the spotlight
(Source: Naked Security) Security software, if it watches out for malware in the web pages you visit, faces a similar challenge: how to spot pages that belong to crooks if they are wrapped ......
Comments Off on What Google knows about data security that you should know too
(Source: CBC.ca) And in an interview with the CBC, James Arlen, director of risk and advisory services for Leviathan Security Group, says the same principles of data security ......
Comments Off on Lenovo’s Superfish spectacle: ‘Catastrophic’ security failures discovered
(Source: ZDNet) Last week, reports surfaced which claimed that Lenovo Notebooks have been issued to consumers containing a preloaded security flaw. Originally, the Chinese ......