Keeping information safe from hackers has always been a priority in the corporate world. But over the past several years, it has become increasingly more important for consumers to use caution when storing personal data. Here are three things your systems should be well equipped with in preparation for cyber predators.
Search Results
Are You Protected? 3 Things Your Sensitive Data Should Be Ready For
Posted: July 13, 2016 in ArticlesTags: data encryption
Data Security – Protecting Your Data
Posted: October 30, 2013 in ArticlesTags: data encryption, data erasure, data masking, data security, security hardware, user authentication
Sir Frances Bacon once said, “Knowledge is power.” While he was likely referring to the type of knowledge found in classic literature and scientific exploration, this memorable and often used phrase is just as applicable to today’s digital databases. Major corporations and everyday individuals keep large amounts of information – everything from store inventories to […]
Google started to encrypt data in cloud storage
Posted: August 16, 2013 in IT Security NewsTags: Advanced Encryption Standard, Google, Google Cloud Storage, user data, user data encrypts
“Google Cloud Storage service is now automatically and free of charge encrypts all user data,” – said in the Internet company Google. According to Dave Barth (the product manager for Google Cloud Storage), embedded encryption process is completely transparent to users and does not affect the performance of the service. “If you enable encryption of […]
Google to upgrade SSL certificates to 2048-bit encryption
Posted: May 26, 2013 in IT Security NewsTags: Google, SSL, SSL certificates
Google has announced the strengthening of all SSL encryption certificates. Developers start using 2048-bit encryption. The new standard will be put into operation gradually. Google starts using the new certificates in August. Fully transition promise to finish by the end of 2013. In most cases and for most users, the transition to another technology will […]
Tor – a tool to ensure the anonymity and security of data in the network
Posted: May 21, 2013 in Antivirus and Security SoftwareTags: anonymity, anonymous network, Network security, Tor
Tor – a system that allows anonymous establish a network connection that is protected from eavesdropping A set of tools for a wide range of users who want to make the web a safer and more reliable. Tor provides the foundation for a range of applications to exchange information over public networks without compromising with […]
The new malicious code steals data on credit cards from POS terminals
Posted: December 25, 2012 in IT Security News, Security NoticesTags: Dexter malware, PoS-malware, ZeuS
Seculert’s experts found specialized malware steals details of bank cards of sale terminals under Windows. The malware, named Dexter, is introduced into the system process iexplore.exe, providing it with a restart when disconnected by hand and prepare a list of active processes, each determines the available memory space, it reads in a local buffer, using […]
Major threat to the security of your data is the World Wide Web
Posted: November 27, 2012 in ArticlesTags: Ethernet-cable connection, Secure home network, security tools configuration, Wi-Fi-routers
Major threat to the security of your data – is the World Wide Web. We will describe how to provide protection for your home network. Often users mistakenly believe that to protect the home PC connected to the Internet is enough conventional antivirus. In introducing misleading and labels on boxes of routers, which states that […]
8% Wi-Fi network in London do not use encryption technology
Posted: September 11, 2012 in IT Security NewsTags: SSL, ssl connections, VPN, WEP, wep encryption, Wi-Fi
Research carried out by Sophos, shows that 8% of the more than 100,000 access points Wi-Fi, registered in the center of London, do not use encryption technology, and 19% use encryption technology, WEP. According to the researchers, the fact that many Wi-Fi networks in London used fairly old technology encryption WEP, can be explained by […]
Running a business is an inherently risky venture. However, there are far more risks to businesses today than things like market forces and stiff competition. Many of these threats can be completely unexpected and can strike at any time. Curbing the danger posed by things like burglars, hackers and malware requires making investments in technology. […]
Secure browser Bitdefender Safepay available for download
Posted: July 31, 2013 in Antivirus and Security SoftwareTags: BitDefender, Bitdefender Safepay, Secure browser
The world-renowned developer of security systems, the company Bitdefender, officially announced the release of a free and secure web-browser for users of Windows. The application is called Bitdefender Safepay 1.9 and is a columnist, “sustainable” to hacker attacks, and provides robust tools for making electronic purchases and online banking. Free version of the browser Bitdefender […]