Google to buy drone maker Titan Aerospace 
Kim Dotcom's Mega working on encrypted email 
By Charis Palmer | May 8, 2013 | Comment Now 
Promises 'pants' for 'naked' users.
Boeing to launch defence-grade Android 
By Liam Tung | Apr 13, 2012 | Comment Now 
Not a plane, nor a satellite, but a phone.
Google offers encrypted search with 'https' site 
May 25, 2010 | Comment Now 
Google promises private browsing via SSL page.
Quantum encrypted networks coming soon to business 
By Liz Tay | Jul 4, 2009 | Comment Now 
Prototype network unveiled.
IBM develops a way to process encrypted data 
By Chuck Miller | Jun 26, 2009 | Comment Now 
A researcher at IBM has developed a way to analyse encrypted data without decoding it, according to a statement from IBM.
Quantum encrypted network goes live 
By Iain Thomson | Oct 10, 2008 | Comment Now 
The first network protected by quantum encryption has gone live at a scientific conference in Vienna.
Terrorist database stolen in raid was encrypted, police confirm 
By Fiona Raisbeck | Aug 14, 2007 | Comment Now 
Thieves have stolen a computer database from a company that specialises in gathering evidence from mobile phone networks to help police track suspected terrorists.
Encrypted microparticles to help cut burglary 
Aug 10, 2007 | Comment Now 
Hertfordshire Constabulary is piloting a new scheme that uses encrypted microparticles to 'mark' home owners' assets so that they can easily be identified in the event of theft.
Steganos opens encrypted OnlineSafe 
By Clement James | Jul 20, 2007 | Comment Now 
Internet security firm Steganos has launched its web-based OnlineSafe service that enables users to encrypt and back-up data.
HBOS: Lost data disk was not encrypted 
By Fiona Raisbeck | Jun 12, 2007 | Comment Now 
A missing disk that contained the personal details of thousands of HBOS customers was not encrypted, the bank admitted today.
Flagstone Encrypted Hard Disk 
By RenĂ© Millman | Jun 1, 2004 | Comment Now 
Securing data when it leaves an organisation is always a problem. Despite user education, a laptop can all too easily be left in a cab and, if not properly secure, information ...
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results