Information Security

Alibabacloud.com offers a wide variety of articles about information security, easily find your information security information here online.

CCTV exposure Cisco, friends, Tengda and other routers have back door

Recently, the National Internet Emergency Center issued "Internet Network security Report", pointed out that link (friends), Cisco (Cisco), Tenda (Tengda), Linksys, Netgear and other routers exist "back door", non-stop advertising, personal information stolen, affecting the net silver security,   And remind users to upgrade the router software as soon as possible. Immediately there are enthusiastic netizens, beware of the router information security and affect their own property. First, the factory password change as soon as possible, we recommend that the first use of the router, immediately modify the factory settings password. Its ...

RSA chief Technology Officer: Cloud Security focuses on identity authentication and compliance

November 2-3rd, RSA Conference held in Beijing, this is the second time RSA conference to China, EMC Information Security Division, RSA chief technology officer Bret Hartman in an interview with CNET reporter, described RSA in the cloud security deployment and planning. Bret Hartman says that as more it shifts to cloud computing, the security of the cloud becomes a very important issue and is critical for RSA. Earlier this year, RSA launched the cloud Security program, called Cloud Trust Authorit ...

More than 100 banks and financial institutions worldwide suffer unprecedented cyber theft

Absrtact: Information Security Service provider Kaspersky Lab recently released its latest Network security research report, saying that more than 100 banks and financial institutions around the world have experienced unprecedented cyber theft, estimated at $1 billion trillion. The report said the Kaspersky Lab, a cyber-offender information Security Service provider, recently released its latest cyber-security research report, saying more than 100 banks and financial institutions worldwide have experienced unprecedented cyber theft, with an estimated 1 billion dollars in losses. The report says the gangs that commit cyber crimes are "Carbanak" ...

Introduction to Check Point Encryption scheme to obtain eal4+ certification

This article is mainly about the Check Point Encryption scheme to obtain eal4+ certification, Internet security field Check Point Software Technology Co., Ltd. has announced its endpoint security (Endpoint) Media encryption scheme Encryption) was awarded the "fourth level certification for general Guidelines Assessment" (eal4+) by the United States National Information Security Cooperation (NIAP). Media Encryption (4.95 HFA build 238) Further strong ...

Wan Zhaoyun Safety Equipment released

In the area of digital crime (cyber criminal), what should we do when attackers have been linked in a chain of interests and designed and implemented various types of attacks in a cooperative manner? Last week, in RSA2009 's opening keynote speech, RSA Executive Director Art Coviello gave his answer: "Creative cooperation (inventive collaboration)". Coviello that in the current security situation, information security of various organizations, enterprises, experts and scholars, should also ...

If the Internet implementation of real-name, what will be the consequences?

Absrtact: The market economy system is based on the anonymous transaction, because the anonymous transaction mechanism is more economical than the transaction cost compared with the real-name transaction mechanism. According to yesterday's "voice of China" "News and newspaper summary" reported that the Ministry of Industry and Information technology, an official said recently, the current network information security is facing serious challenges, security is the first responsibility. and network security to the specimen and treatment, the root causes, the current relevant departments are studying the implementation of mobile phones, the network real-name System. has been concerned about the real-name system has been given the "security" of the task, but did not think that the real-name systems in line with the market economy law. Network real name ...

Chinese Academy of Social Sciences publishes new media blue Book in Beijing

Chinese Academy of Social Sciences publishes new Media Blue Book: China New Media Development Report (2010). The Blue Book thinks, social network is china Internet 2009 years hot spot, but social networking website also easy to raise personal information security problem, cannot neglect. According to the Blue Book, through social networking sites, business companies can not only collect the user's cell phone number, MSN account and other general information, but also through the analysis of the blog published by netizens, posts, groups of students, etc., to speculate on consumer propensity (thrift or luxury), personal marital status (single or divorced), work (whether there is a jump ...

Li Yizhong: The development of information industry is the first priority

Absrtact: April 13 News, Minister of Industry and Information technology, Li Yizhong, in the 2010 economic and trade Situation report, said, to attach great importance to network information security, the world's most countries mobile phones, the network are using real-name system, China to learn from foreign experience, the implementation of mobile phone April 13 News, The Minister of Industry and Information technology, Li Yizhong, recently attended the 2010 economic and trade Situation report, said that we should attach great importance to network information security, the world's most countries mobile phones, the network are using real-name system, China to learn from foreign experience, the implementation of mobile phones, the network real-name System,

Amoy to start the implementation of a new round of network shopping self-point strategy

Absrtact: April 29 News, from the Amoy network shopping in Changzhou from the point of strategic conference learned that, in view of the current network shopping in the field of the last kilometer problem and online shopping information security problems, Amoy to launch the implementation of a new round of network shopping strategy, planning in the city to build 713 of April 29 news, from Amoy Changzhou "online shopping from the point" The Strategy Conference was informed that in view of the current "last kilometer" problem in the field of online shopping and the security of Internet purchase information, Amoy started to implement a new round of "network purchase from the point of" strategy, planning in the city to build 713 of the network to buy their own points, the highest density, the first batch of 3 ...

Security Advisor teaches you how to use social networks safely (1)

The commercial advantages of websites like LinkedIn and Facebook are beginning to overwhelm security and privacy risks--but only if you follow a few principles, two security professionals say. Schmidt, who served as President Bush's network security advisor, succeeded in transforming from a chief information security officer to a consultant; At first he refused to catch up with the social network, which he said was the paranoid root of his long career in the security industry. But he eventually felt that social networking was positive ...

Large data: Opportunities, challenges and countermeasures of enterprise competitive intelligence

Large data: the opportunity, challenge and countermeasure of enterprise competitive intelligence Wu Jinghong Zhang Fei Shi Fang "Big Data" the advent of the era, to all walks of life has brought the fundamental changes in the way data are used. Firstly, the paper expounds the connotation and characteristics of large data, and thinks that large data is helpful to improve the authenticity, accuracy and real-time of competitive intelligence. On this basis, the paper analyzes the challenges faced by enterprise competitive intelligence, including information storage, intelligence analysis, information security and talent shortage. Finally, from intelligence consciousness, intelligence organization team, competitive intelligence system and intelligence ...

The development of information industry is the first priority

Absrtact: April 13 News, Minister of Industry and Information technology, Li Yizhong, in the 2010 economic and trade Situation report, said, to attach great importance to network information security, the world's most countries mobile phones, the network are using real-name system, China to learn from foreign experience, the implementation of mobile phone April 13 News, The Minister of Industry and Information technology, Li Yizhong, recently attended the 2010 economic and trade Situation report, said that we should attach great importance to network information security, the world's most countries mobile phones, the network are using real-name system, China to learn from foreign experience, the implementation of mobile phones, the network real-name System,

Multinational software giant company 6th released the latest Security Intelligence report

The International software Giant, 6th, released its latest Security Intelligence report, warning that users who are still using Windows XP operating systems that have been in service for more than 12 years need to upgrade to the latest operating system as soon as possible for better security. In its report, Microsoft called for "Upgrade your operating system for your information security."   However, market participants are more likely to interpret the "safe goodwill" of the multinational software giant as "forcing" more users to buy upgrades to their latest releases of the operating system. The report says more than 1 billion of the world's more than 100 countries and regions ...

Yahoo 3721 sued Ann doctor Rogue Software case October 24 session

On the morning of October 12, Dr. Ann said, "Dr. Ann and 3721 cases will be in the morning of October 24, the Haidian People's Court 44 court." "Because of the complexity of the court procedure and the difficulty in gathering evidence, the case has not progressed until now, but thanks to the attention of the community," the person said. "The whole story is, July 24, 2006, Yahoo China to engage in information security of the Doctor's company to court." Yahoo said in the complaint, Dr. Ann's AntiSpyware software "3721 network real name" software identified as "spyware" (Domestic ...

The second RSA Conference trusted computing and cloud security became the hotspot

The industry-renowned RSA Conference of information security events will be held in Beijing from November 2, 2011 to 3rd, the Second International Forum on Information Security held by RSA in China.   Today, the RSA General Assembly Technical Committee officially released the theme and main topics of this meeting. RSA chief Technology Officer Bret Hartman said that the RSA 2011 Forum theme was Alice & Bob, still continuing the theme of this year's San Francisco Congress in February. Because Alice and Bob's initials were a ...

Around the introduction of relevant laws and regulations on the express industry to improve

With the rapid development of express industry, all over the introduction of relevant laws and regulations on the express industry to improve. Recently, the Beijing municipal government executive meeting to consider the adoption of the "Beijing Express Safety Management measures" (hereinafter referred to as the "method").   It is reported that the "method" in addition to the construction of express security responsibility, security and supervision system, but also to standardize the safety management system, express waybill information security, express vehicles, emergency drills, terminal delivery and other matters made clear provisions. According to the introduction, the "Method" in the express security responsibility system to clear the government, enterprises and users of tripartite responsibility. The government is responsible for the administrative supervision ...

Many vendors, including IBM, have joined the ranks of SaaS

Software as a service may be one of the hottest technologies for networked storage at the moment, but users are still not comfortable keeping their key data out of their home. "We just feel uncomfortable putting the data outside, and we need to keep them inside the company in order to make them safer," he said. "Our data are so sensitive to family education rights and privacy laws and the health Insurance flow and Responsibility Act that bind our data," said Williamsouder, chief information security officer at Berry College in Georgia. "Currently, including IBM, go ...

Security dog attack and defense competition: to "WU" friends, to show the charm of attack and defense

By the National Computer Network Emergency Management Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 The China Internet Security Congress (ISC2014), sponsored by the Internet Security Center and the China Internet Association Network and Information Security Working Committee, was held in September 24-25th at the Beijing National Convention Center. As the most authoritative annual summit in the Asia-Pacific Information Security field, this conference brings together the father of computer virus, the father of Internet security in China, the top security experts in China's information security field and so on.

Academician of Engineering Academy NI: Mobile operating system will be localized in 3 years

Absrtact: Chinese Academy of Engineering, NI, said that China lacks autonomous and controllable domestic mobile operating system to leave information security. He predicts that in the next 3 to 5 years, the mobile operating system will be a localized alternative. Ni that the use of Chinese Academy of Engineering in mobile devices NI recently said that China lacks autonomous domestic mobile operating system for information security left hidden dangers.   He predicts that in the next 3 to 5 years, the mobile operating system will be a localized alternative. Ni that most of the operating systems used in mobile devices are American apple ...

When China's own operating system is available

Some time ago there was this news: the Chinese government banned the procurement of Windows 8 systems, saying its architecture is not conducive to information security. But is it safe to think of Windows 7? Or would you like to wait for Windows to grow to 9 or 10 or be safe to buy later? At this time people are always very urgent want a domestic operating system, the splendid loaded into our Chinese computer, no longer low body gas, righteousness is words to Microsoft said "no". The news earlier in the day was that red flag liquidation assets were ready for sale. Expert famous door once sworn oath ...

Total Pages: 4 1 2 3 4 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.