Asia's Source for Enterprise Network Knowledge

Sunday, February 26th, 2017

Data Encryption And Security

First iOS trojan exploiting Apple DRM design flaws infects any iOS device
A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Insurance challenges Businesses shelled out $2 billion in cyber insurance premiums in 2015 but...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Perhaps hundreds of emails cross your screen every day. The day can drag on and in the monotony of...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Security researchers have found a new ransomware program dubbed Spora that can perform strong...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
If you've encountered errors over the past month when trying to access HTTPS-enabled websites...
Operators of mission-critical networks must always provide cast-iron protection of their...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Users around the world have had trouble accessing some HTTPS websites due to an error at GlobalSign...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Everybody shares stuff, man. That line, from ‘70s stoner comics Cheech and Chong, was...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
To push more websites to implement encryption and to better protect users, Google will start...

WhitePapers

Barracuda Backup is an affordable, integrated local and offsite data backup and...
Adoption of network-attached storage (NAS) devices has increased significantly...
As we realize the benefits of big data in the enterprise, we often...