Google to buy drone maker Titan Aerospace 
 
Kim Dotcom's Mega working on encrypted email 
By Charis Palmer | May 8, 2013 | Comment Now 
Promises 'pants' for 'naked' users.
 
Boeing to launch defence-grade Android 
By Liam Tung | Apr 13, 2012 | Comment Now 
Not a plane, nor a satellite, but a phone.
 
Google offers encrypted search with 'https' site 
May 25, 2010 | Comment Now 
Google promises private browsing via SSL page.
 
Quantum encrypted networks coming soon to business 
By Liz Tay | Jul 4, 2009 | Comment Now 
Prototype network unveiled.
 
IBM develops a way to process encrypted data 
By Chuck Miller | Jun 26, 2009 | Comment Now 
A researcher at IBM has developed a way to analyse encrypted data without decoding it, according to a statement from IBM.
 
Quantum encrypted network goes live 
By Iain Thomson | Oct 10, 2008 | Comment Now 
The first network protected by quantum encryption has gone live at a scientific conference in Vienna.
 
Terrorist database stolen in raid was encrypted, police confirm 
By Fiona Raisbeck | Aug 14, 2007 | Comment Now 
Thieves have stolen a computer database from a company that specialises in gathering evidence from mobile phone networks to help police track suspected terrorists.
 
Encrypted microparticles to help cut burglary 
Aug 10, 2007 | Comment Now 
Hertfordshire Constabulary is piloting a new scheme that uses encrypted microparticles to 'mark' home owners' assets so that they can easily be identified in the event of theft.
 
Steganos opens encrypted OnlineSafe 
By Clement James | Jul 20, 2007 | Comment Now 
Internet security firm Steganos has launched its web-based OnlineSafe service that enables users to encrypt and back-up data.
 
HBOS: Lost data disk was not encrypted 
By Fiona Raisbeck | Jun 12, 2007 | Comment Now 
A missing disk that contained the personal details of thousands of HBOS customers was not encrypted, the bank admitted today.
 
Flagstone Encrypted Hard Disk 
By RenĂ© Millman | Jun 1, 2004 | Comment Now 
Securing data when it leaves an organisation is always a problem. Despite user education, a laptop can all too easily be left in a cab and, if not properly secure, information ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 465

Vote