PRODUCTS

Cyber Security Elements by NSS

Author name: admin9am

Planes can be hacked remotely with Android app, researcher claims

  to hack a plane. That includes potentially gaining information about an aircraft’s onboard computer, changing the intended destination, flashing interior lights, delivering spoofed malicious messages that affect the behavior of the plane, and, just maybe, if pilots don’t manage to turn off autopilot and/or have difficulty with manual flight operation, crashing the plane. These […]

Planes can be hacked remotely with Android app, researcher claims Read More »

Οι πελάτες δίνουν πολύ υψηλή βαθμολογία στη Sophos, η οποία πραγματοποιεί όσα υπόσχεται

Στο διάγραμμα που δημοσιοποιήθηκε από ανεξάρτητη εταιρεία ερευνών, και περιλαμβάνει τους Δείκτες Υπόσχεσης και Εκπλήρωσης, μπορείτε να δείτε και να συγκρίνετε την αποτελεσματικότητα ορισμένων από τις σπουδαιότερες εταιρείες της βιομηχανίας των υπολογιστών στο marketing αλλά και στην εκτέλεση. Ένας κατασκευαστής, που βρίσκεται στο πάνω δεξί τεταρτημόριο του διαγράμματος, έχει βαθμολογηθεί με υψηλή βαθμολογία τόσο στο

Οι πελάτες δίνουν πολύ υψηλή βαθμολογία στη Sophos, η οποία πραγματοποιεί όσα υπόσχεται Read More »

GlobalSign: Biometric Technology Could Mean More Secure Enterprise Data

 But what are the implications of biometric technology as far as enterprise security is concerned? Ryan Hurst, CTO of enterprise SaaS Certificate Authority GlobalSign, has told Softpedia that biometric technology could turn out to be highly beneficial to organizations looking to protect their data, but it depends a great deal on how it’s implemented. “The

GlobalSign: Biometric Technology Could Mean More Secure Enterprise Data Read More »

Sophos honoured with Partnership Award from Queensland Police Service

Steve Gollschewski, Deputy Commissioner, Strategy, Policy and Performance presented the award to Rob Forsyth, Director Sophos Asia Pacific, in recognition the team’s ongoing partnership with the Queensland Police Service, working closely with the community to provide education material for community groups, as well as hosting the Sophos Signature events to explore current and emerging issues,

Sophos honoured with Partnership Award from Queensland Police Service Read More »

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication

The authentication system, based on a new material for the home button and a metal sensor ring around it, has been the subject of numerous rumours and leaked photos and specs already. Speculation about Apple’s interest in fingerprints goes back at least as far as 2009, resurfaces each time a new version of the iPhone

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication Read More »

Sophos Mobile Control Delivers Immediate Support for Apple iOS 7

In addition to delivering iOS 7 support, Sophos announced an update for customers to manage the new business-focused features of Apple’s latest version from the easy-to-use Sophos web-based console, deployed either on-premise or as Software as a Service (SaaS).  According to Gartner, Apple iOS 7 includes more enterprise enhancements than any release since iOS 4.0

Sophos Mobile Control Delivers Immediate Support for Apple iOS 7 Read More »

Firefox burns Chrome in our trustworthy browser poll

Our poll offered readers the chance to vote for one of the six most popular web browsers – Chrome, Firefox, Internet Explorer, Opera, Safari and Chromium – and asked which you trusted the most. Mozilla’s Firefox, the linear descendant of both Netscape Navigator and the original ‘graphical web browser’ the NCSA Mosaic, was a runaway

Firefox burns Chrome in our trustworthy browser poll Read More »

Critical Infrastructure Providers Strengthen Cybersecurity by Implementing Standards-Based PKI

Recent headlines and mounting evidence suggest that cyberattacks on Critical Infrastructure (CI) systems are increasing as cybercriminals have identified electric utility grids as prime targets for disruption activities. As a result, CI cybersecurity has become a prime concern for governments and citizens alike. The paper focuses on the history of the electric industry, how cybersecurity

Critical Infrastructure Providers Strengthen Cybersecurity by Implementing Standards-Based PKI Read More »