The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus
FRIDAY, AUGUST 28, 2015

Latest Comments

Social Networks

    #tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, the tokenization system provides a mapping procedure. This reverse procedure needs the tokenization system and […]

    Read more ...

    Source photo Microsoft’s new Edge #browser, which is built into #windows 10, has a lot to offer, including the ability to annotate Web pages and work with Cortana — the Windows version of Apple’s Siri voice assistant. It also loads pages very quickly. However, there’s at least one thing missing, and it’s going to keep […]

    Read more ...

    Surely this has happened to you before: you’re browsing online and you come across a blog or website that has a plugin for Chrome that you think looks interesting or useful. You check out the developer’s website, have a look at the benefits and decide to download it. All you need to do is click […]

    Read more ...

    Commandeered Jeep gets fixed but a ‘hijacked’ satellite network does not? Why Internet of Things security remains a work in progress. Fiat Chrysler’s move to recall 1.4 million vehicles this month in response to a dramatic vulnerability discovery by renowned car hackers represents a tipping point in how some major consumer/IoT product vendors have begun […]

    Read more ...

    In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure industry that ever existed. However, the buzz was about another aspect of security — the one quite surprising for an average passenger and quite expected […]

    Read more ...