You Are Browsing ‘Security ’ Category

Comments Off on Wind River – Virtualization technology integrated into next-generation RTOS for Internet of Things

(Source: Electropages) Wind River, a world leader in delivering software for intelligent connected systems, has introduced a virtualization profile for the next generation version of its .. ...

Comments Off on BYOD Is the Corporate Norm But Data Security Lags Far Behind

(Source: Entrepreneur) IT is chartered with securing the organization’s data so they use the technology available to them – MDM. That the price of this BYOD security … ...

Comments Off on 178 million phones at security risk in Middle East, Africa

(Source: Economic Times) Enterprise security player Palo Alto Networks says Android Internal Storage is a protected area that Android- based applications use to store … ...

Comments Off on Symantec to Overhaul Its Norton Security Line

(Source: Wall Street Journal) The new product, called Norton Security, doubles down on the company’s renewed focus on subscription models. In its most recent quarter, when Symantec … ...

Comments Off on Dell Venue 11 Pro 7139 (Security) review: Supremely powerful and super secure

(Source: ) The “Pro” suffix indicates that this tablet runs Windows (Dell’s Venue tablets are Android devices), and the “7139 Security” tag adds a whole list of features not … ...

Comments Off on Data Breach Puts Focus on Beefed-Up Card Security

(Source: Wall Street Journal) Chip cards already have been used for years in Europe, Asia and Canada, resulting in a steep drop in card fraud, according to industry analysts. Getty Images. ...

Comments Off on Skype Has A Security Problem With Leaking Chats

(Source: Forbes) Skype, the communications network Microsoft bought for $8.5 billion in 2011, has a bug in its code that allows your confidential company group chats to leak to … ...

Comments Off on Should You Pay for Internet Security Software?

(Source: PC Advisor) Do you need antivirus? Or, as it’s now swelled and sold, ‘internetsecurity’? Equally efficacious antivirus can be downloaded for free from some familiar names, … ...

Comments Off on Is Your Data Really Safe? These are the 8 Worst Security Breaches in History

(Source: BGR) Online security is constantly improving, of course, but even the biggest companies in the world are susceptible to security breaches. And the sad truth of the … ...

Comments Off on Stacking up Open Clouds

(Source: ZDNet) Adoption of open source software in the enterprise continues to grow, with research suggesting the two largest factors fueling this growth are security and quality … ...