Showing 1-9 of 9 results
-
Symantec boosts authentication
Database, Don Sambandaraksa, Published on 17/11/2010
» After 27 years of providing security for end points, Symantec has launched a new logo and acquired a number of companies that together will provide the trust, strong identity and encryption it needs to protect a world where servers are virtualised and are somewhere in the cloud outside of the company's data centre and where CIOs need to be responsible for data that flows readily to their employee's personal smart phones.
-
Seeking unified global approach to cyber crime
Database, Don Sambandaraksa, Published on 20/10/2010
» With cyber terrorism on the increase, the world's law enforcement agencies need to come together to combat the problem.
-
Privacy a double-edged sword
Database, Don Sambandaraksa, Published on 13/10/2010
» Trust. It's one of those things that takes forever to build yet can be destroyed all too easily.
-
Kaspersky wants digital passports
Database, Don Sambandaraksa, Published on 29/09/2010
» In the '90s we had cyber hooligans and cyber vandals who wrote viruses just for the fun of it. In the first decade of the 21st century, cyber criminals aimed at enriching themselves. Today, with the discovery of the new Stuxnet worm, the world is facing the threat of cyber terrorism.
-
Targeted malware grows ever more sophisticated
Database, Don Sambandaraksa, Published on 29/09/2010
» Up until now, malware writers have been motivated by money. The era of malware-writing for fun was over long, long ago.
-
The case of the missing data privacy law
Database, Don Sambandaraksa, Published on 25/08/2010
» The problem with the computer crime law is not the law itself, but the fact that it was designed as a pair of laws and the thrust of criticism levelled at the law today is really a reflection of the missing data privacy law that was drafted alongside it - the yin to the cyber crime law's yang.
-
Censorship versus security
Database, Don Sambandaraksa, Published on 18/08/2010
» Freedom of speech, abuse of power by the government, and the new norms of a democratic society empowered by the Internet were all topics discussed by a wide variety of speakers at a seminar on the third anniversary of the Computer Misuse Act, often known as the Cybercrime law, hosted by the Thai Netizen Network, Media 4 Democracy and the Southeast Asia Press Alliance.
-
To BB or to not BB, that is the question
Database, Don Sambandaraksa, Published on 11/08/2010
» Poor Research in Motion. The news of the launch of BlackBerry OS 6 and the new BlackBerry Torch was all but overshadowed by news of how the forces of morality and control had taken the opportunity to declare war on BlackBerry Messaging and privacy in general.
-
Big Brother is watching - and waiting to break down your doors
Database, Don Sambandaraksa, Published on 24/02/2010
» What do the GT200 magic wand and the Internet Sniffer project have in common? Both are an assault on privacy and allow the state to pick on anyone at will.
Your recent history
-
Recently searched
-
Recently viewed links