Facebook iconTwitter icon
B2B-Network:
The Brave New World of Biometric Eye-Scans
Thumb gfx033

As we hurtle forward through the second decade of the 21st century, technology is advancing at an ever increasing rate. Technology that was once thought the preserve of sci-fi movies is now set the become reality, and there are few examples more pertinent in this regard than biometric eye-scanning.

Since John Daugman patented his iris-recognition algorithm in 1991, the writing has been on the wall: the practical application of these scans, after all, has always been blatantly evident. While many of us regarded the introduction and widespread use of such biometric systems as inevitable,...

» Read more
Simple security in the mobile 'jungle'
Itsecurity placeholder

Last month's 8th annual IT Security Analyst & CISO (chief info security officer) Forum organised and hosted by Eskenzi PR brought together a fascinating combination of those in charge of securing household names in the insurance, banking, accounting, pharmaceuticals and media verticals and a rich vein of vendors offering their security wares.

( Source: www.computerweekly.com )
» Read more
Android Malware Threats and How to Stay Safe
Thumb untitled 15

The growth in the popularity of Android smartphones has been a great contributor to the spread of malware based on the platform. Delving a bit into details, the Android market share grew to a whopping 87% in 2013 and at the time, the platform accounted for about 97% of all infection cases. Looking at the growth in the number of threats, there were 238 reported in 2012 and 804 in 2013. During this time, the combined total of all new threats on the BlackBerry OS, Apple iOS and Microsoft Windows Phone platforms was zero. The 3% was from the Symbian platform.

So how do you stay secure?

Although...

» Read more
6 Best Practices for more security on mobile terminals
Thumb open uri20150309 2214024 ybg4us

Mobile terminals constitute a double-edged sword. One the one hand, users like the flexibility those devices offer. On the other hand, IT-departments partly regard them as a curse, notably in terms of security, since, especially in dealing with mobile terminals data security has high priority, and only a most intensive and comprehensive security strategy ensures that IT-departments can be dead certain that data- or identity theft does not occur.
Hence, Dell has released a list of 6 Best Practices that enables users to create quite a safe work environment in which company data- and...

» Read more
Loader