Essential Security Software plans to announce on Monday the release of Taceo, an e-mail encryption and rights-management product aimed at small businesses. Taceo lets users encrypt e-mail and restrict the recipient by blocking the ability to print, forward, take screenshots or cut information to the clipboard, Essential said in a statement. An e-mail can also be set to be unreadable until a certain date and time, or set to expire.
PGP Corp. in November plans to ship a new encryption software bundle for laptops, desktops and servers, the company said Monday.
The new Whole Disk Encryption products offer full encryption of the hard drive disk when a computer is turned off, helping protect the data if the PC is stolen or lost. In addition, a PC user can choose to encrypt a file on the fly when a system is running, PGP Corp. said Monday in a statement.
The bundle also enables people to securely store data on external devices and permanently erase data on a disk, the company said.
EVERY fine issued by speed cameras could be invalid, after the Roads and Traffic Authority admitted yesterday it could not prove the authenticity of the pictures they take.
In a double blow to the RTA, The Daily Telegraph can also reveal that Sydney Harbour Tunnel cameras monitoring toll cheats have been switched off for at least three years - and no penalties handed out.
The revelation came as Sydney magistrate Lawrence Lawson threw out a speeding case after the RTA said it had no evidence that an image from a camera had not been doctored.
In today's workplace, stealing information doesn't require a covert Special Forces team: It is often done by an employee armed with a 5 GB USB flash drive. And your unsecured, unencrypted network invites a hacker to compromise a server or workstation holding sensitive data.
But you don't have to be vulnerable. There are plenty of options available today for securing/encrypting your data and many of these options are just overlooked.
New research on several commonly used hash algorithms has revealed security weaknesses in e-commerce systems and the internet, according to experts.
Hash algorithms are used by computers to compare data, and are a cornerstone of encryption and IT security systems. However, experts have warned that hackers now require only 15 minutes to create two email messages that produce the same digital signatures when checked by the most commonly used hash algorithms.