Quantcast

Latest Computer security Stories

free-form password protection
2014-06-05 04:43:10

Peter Suciu for redOrbit.com - Your Universe Online Security experts have long recommended that a "strong" password should be considered when using a PC, but the need for complex and hard to crack passwords has become even more necessary with the rise of mobile devices including phones or tablets. While hackers can try to remotely break into a system with mobile devices, users also need to watch out for prying eyes. "All it takes to steal a password is a quick eye," said Janne...

2014-06-04 23:14:11

SyferLock Technology Corporation (http://www.SyferLock.com) today announced that it has proven interoperability of SyferLock’s GridGuard™ two-factor and multi-factor authentication solutions with a range of Microsoft’s software including Office 365, Microsoft OneDrive, Microsoft Outlook Web Access and Windows Terminal Server. Shelton, CT (PRWEB) June 04, 2014 SyferLock Technology Corporation (http://www.SyferLock.com) today announced that it has proven interoperability of...

2014-06-04 23:05:40

Panel members include former deputy secretary of the Department of Homeland Security and Iowa’s chief information security officer Portland, Oregon (PRWEB) June 04, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that Elizabeth Ireland, vice president of marketing, will be moderating a panel discussion on cybersecurity strategy at the Gartner Security and Risk Management Summit 2014. The conference will take...

2014-06-04 23:02:32

Business Associates and Covered Entities can now download the industry leading HIPAA security awareness and training PPT presentation today from myhipaasecuritytraining.com, one of North America’s leading specialists in healthcare regulatory compliance. Atlanta, GA (PRWEB) June 04, 2014 Business Associates and Covered Entities can now download the industry leading HIPAA security awareness and training PPT presentation today from myhipaasecuritytraining.com, one of North America’s...

2014-06-04 16:20:44

New study analyzes security vulnerabilities of Keystone XL and the threat posed to nearby agricultural lands and waterways WASHINGTON, June 4, 2014 /PRNewswire/ -- The first-ever threat assessment of the proposed Keystone XL pipeline highlights the potential security vulnerabilities. The report finds that the pipeline has a high-risk of being exploited and could easily cause a catastrophic spill of more than seven million gallons of toxic tar sands "dilbit" into surrounding farmlands and...

Making The Internet Of Things Safer With New Tool Developed By Computer Scientists
2014-06-04 03:09:48

University of California, San Diego Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool’s potential uses is described in the May-June issue of IEEE Micro magazine. “The stakes in hardware security are high”, said Ryan Kastner, a professor of computer science at the Jacobs School of Engineering at UC San Diego. There is a big push to...

2014-06-04 08:40:56

CLEARWATER, Fla., June 4, 2014 /PRNewswire/ -- WHAT: ThreatTrack Security CEO Julian Waits, Sr. will host the 2014 Cyber Security Summit, taking place in Washington, D.C., on Thursday, June 5, 2014. The Summit brings C-level and senior executives responsible for protecting critical infrastructures together with cutting-edge technology providers and renowned information security experts. http://photos.prnewswire.com/prnvar/20140219/NE67666LOGO WHEN: Thursday, June 5, 2014, 8:55...

2014-06-04 08:40:41

Dramatically reduces costs associated with releasing secured code as part of a Secure SDLC (SSDLC) LOS ANGELES, June 4, 2014 /PRNewswire/ -- Prevoty, Inc., a new security software company providing a radical real-time application security capability for enterprises, today announced support for private clouds for the company's flagship Prevoty Enterprise suite. While the majority of enterprises understand the value in using an SSDLC methodology to develop more secure applications,...

2014-06-04 08:38:01

Solutions Provide Persistent Endpoint Security and Management to K12 Students and Faculty VANCOUVER, June 4, 2014 /PRNewswire/ - Absolute® Software Corporation (TSX: ABT), the industry standard for persistent endpoint security and management solutions for computers, laptops, tablets and smartphones, today announced 21 of the 25 largest school districts in the United States use Absolute Software solutions to protect, secure, and manage devices used by students and faculty.*...

2014-06-04 08:37:59

NEW YORK, June 4, 2014 /PRNewswire/ -- root9B, a Premier Alliance company (OTCQB: PIMO), has unveiled its new cutting-edge cybersecurity research, training and operations facility in Honolulu, Hawaii. root9B continues to bring industry-leading, technically sophisticated training and advanced cybersecurity capabilities and services to its customers in the Pacific region. This new facility, located in downtown Honolulu, is utilized to train and equip several Department of Defense...


Word of the Day
mallemaroking
  • Nautical, the visiting and carousing of sailors in the Greenland ships.
This word is apparently from a confusion of two similar Dutch words: 'mallemerok,' a foolish woman, and 'mallemok,' a name for some persons among the crew of a whaling vessel.