Information Security

Alibabacloud.com offers a wide variety of articles about information security, easily find your information security information here online.

The first safe mobile phone with Chau 960e today 1888 officially on sale

Today 10:00, the world's first security mobile phone 960e in Jingdong Mall officially open for sale, the price of 1888 Yuan. This is the Chinese Academy of Engineering recommended 960 security mobile phones, since the release has been the concern of insiders, after April 21 April 23 for 3 consecutive days of booking activities, the number of appointments to break 100,000, for mobile phone sales laid a good foundation. Not long ago, in the domestic first independent mobile phone security operating system 960 OS Media meeting site, Chinese Academy of Engineering Liu Yanjie has revealed that the central actually attaches great importance to mobile information security issues, many places heavy ...

Why personal information is unsafe

Summary: CPPCC member, Lenovo Group board chairman Yang Yang, March 8 News, recently, CPPCC members, Lenovo Group board chairman Yang Yang submitted the "on the smart phone should ensure user information security proposal." Yang said that the intelligent hands of the CPPCC member, Lenovo Group board chairman Yang Yang, March 8 News, recently, the National Political Consultative Committee member, Lenovo Group board chairman Yang Yang submitted the "Smart phones should ensure user information security proposal." Yang believes that smartphones have become the first choice for Internet users ...

Response to WIN8 procurement banned Microsoft issued 5 statement

Absrtact: Last night, Microsoft China issued 5 statements to talk about information security. Analysts say this is a formal response from a series of incidents in which Microsoft China has been banned by the government for WINOWS8 (WIN8, hereinafter referred to as the same). Microsoft China issued 5 statements last night on its official microblog, which talks about information security. Analysts say this is a formal response from a series of incidents in which Microsoft China has been banned by the government for WINOWS8 (WIN8, hereinafter referred to as the same). Microsoft China said on its official microblog that Microsoft is producing ...

Privacy Information The underground industry chain is disclosed

Beijing News (reporter Lin Chiling) Rising yesterday released the "2012 China Information Security Comprehensive report", the first time in the domestic disclosure of personal privacy information integrity of the underground industry chain. The report said that 2012 personal privacy into "tight merchandise", hackers and cyber fraudsters are stealing money from netizens, but also frantically to obtain personal identity information, a large number of transactions online. A set of privacy information can be repeatedly sold, so this business discriminating, the temptation of a great security experts pointed out that hackers use social engineering principles and many modern means, a large number of user information, and then the letter ...

With the rapid development of express industry, all over the introduction of relevant laws and regulations on the express industry to improve

With the rapid development of express industry, all over the introduction of relevant laws and regulations on the express industry to improve. Recently, the Beijing municipal government executive meeting to consider the adoption of the "Beijing Express Safety Management measures" (hereinafter referred to as the "method").   It is reported that the "method" in addition to the construction of express security responsibility, security and supervision system, but also to standardize the safety management system, express waybill information security, express vehicles, emergency drills, terminal delivery and other matters made clear provisions. According to the introduction, the "Method" in the express security responsibility system to clear the government, enterprises and users of tripartite responsibility. The government is responsible for the administrative supervision ...

The network security strategy has shifted from the state-oriented passive defense to the active aggressive attack.

In the 2013, the "Prism gate" incident triggered by Snowden can be seen that the western developed countries, represented by the United States, have shifted from the passive defense of the state as the main body to the active and aggressive attack.   As a network of 600 million Internet users and information security, the main injured country of cyber-attack, China should be driven by potential, should be dynamic, homeopathy, timely adjustment of national information security strategy, with the global thinking of the information security situation in China, the development of "offensive and defensive combination" of national information security strategy, and rapid deployment of implementation. First, the passive defense of the network Ann ...

Wave deployment implement K relocation Project launch host localization

Absrtact: Wave group chairman and CEO Sun Pi speech aimed at breaking the host foreign monopoly, the protection of national information security of the Wave K relocation project, officially launched in Beijing yesterday. K Relocation project will fully accelerate shuttle K1 to replace the IOH (IBM, Oracle and HP) minicomputer process. Wave Group chairman and CEO Sun Pi speech aimed at breaking the host foreign monopolies, the protection of national information security of the Wave K relocation project, officially launched in Beijing yesterday. "K Relocation Project" will fully accelerate shuttle K1 to replace IOH (IBM, Oracle and HP) small ...

Domestic software industry boom rapid rise concept stocks meet the opportunity to rise

Absrtact: Recently, the Ministry of Industry and Information Technology released 2014 years of software industry performance report. The report shows that 2014, China's software and information technology services industry to achieve software business income of 3.7 trillion yuan, an increase of 20.2%. In addition, February 2, China Telecom Heilongjiang Company recently, the Ministry of Industry and Information Technology released 2014 years of software industry performance report. The report shows that 2014, China's software and information technology services industry to achieve software business income of 3.7 trillion yuan, an increase of 20.2%. In addition, February 2, China Telecom Heilongjiang public ...

CLOUD COMPUTING Security in BUSINESS information Bae

CLOUD COMPUTING Security in BUSINESS information Bae Sasko Ristov, Marjan Gusev and Magdalena Kostoska at this monitors we Analyze main Analysys and industrial standards targeting information ...

What is the impact of the "safety door"?

Absrtact: There seems to be another black swan appearing in China's capital market. A few months after the Zhangzidao island scallop went, Hai Kang Wei view (002415. SZ) is concerned about the serious information security problem. Hai Kang Wei View the cause of this thing is the Public security Bureau of Jiangsu Province China's capital market seems to have a "black Swan" appeared. After a few months of Zhangzidao Island "where the scallops go", Hai Kang Wei View (002415).   SZ) is concerned about the serious information security problem. Hai Kang Wei Depending on the cause of this thing is the Public security Bureau of Jiangsu Province issued a notice, said ...

Mingzhao: Take practical action to maintain network security

Absrtact: November 5, 2013, the fourth session of the Global Network Space Cooperation summit held at Stanford University in the United States, Mingzhao, director of the State Council's information office, made his only keynote speech at the opening ceremony. The Director of the State Council's information Office, Mingzhao, November 5 at the fourth session of November 5, 2013, the fourth Global Network Space Cooperation summit held at Stanford University, the director of the State Council's information Office, Mingzhao, made the only keynote speech at the opening ceremony. China State Council Director of Information Office Mingzhao November 5 in the fourth Global network space cooperation peak ...

Steal website personal information hacker earn million dollars

Absrtact: The reporter then through the thorough understanding discovers, at present many social, the recruitment and so on personal information related website, already became the hacker and the commercial website steals the wealth the new platform. A more detailed personal information, the price can even reach 50 yuan. Social, recruitment site security hidden dangers hackers use their loopholes to sell personal information a detailed information to profit up to 50 yuan to steal personal information hacker month million news (reporter Yangfan) "This week, countless courtship phone and SMS let me see the phone on the upset!" "The unmarried Miss Zhang told the reporter yesterday that she was in a house ...

Mitigate enterprise risk from PHP hyper-global variables

This article describes the vulnerabilities of PHP applications and how attackers can use PHP hyper-global variables to perform web attacks. And explain what is the PHP Super global variable and the risks it poses. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border= ' 0 ' alt= "mitigate enterprise risk from PHP hyper-global variables" Src=&qu ...

Cisco denies involvement in "Prism gate" says it hasn't monitored China communications

Absrtact: Yesterday, Cisco denied the involvement of the prism door, the company issued a statement that its network did not participate in the project, will not be equipment customization. Previous sources said that the prism gate revealed Snowden, the U.S. National Security Agency through Cisco Road yesterday, Cisco against the "prism door" to deny, the company issued a statement that its network did not participate in the project, will not be customized for the project. It was previously reported that the "Prism gate" Snowden revealed that the U.S. National Security Service through Cisco routers to monitor Chinese networks and computers. And Cisco is involved in almost all of China ...

First contact with scientists in real life

"The first time in real life to contact scientists, they do not make me feel a sense of distance, very cordial." They are also through their own continuous efforts to achieve success, these stories give us self-confidence, we can rely on unremitting efforts, and then stand on tiptoe can reach the dream.   "From Jilin Province Changchun Shuangyang District Second experimental primary school grade six Liu 祎, after listening to the tide information president, the Wave group chief Scientist Wang Endong after the speech felt refreshing." Sponsored by the Communist Youth League Central, the national Shao, the 64 anniversary of the theme event held on October 13 ...

Rapid growth of domestic software industry

Absrtact: Recently, the Ministry of Industry and Information Technology released 2014 years of software industry performance report. The report shows that 2014, China's software and information technology services industry to achieve software business income of 3.7 trillion yuan, an increase of 20.2%. In addition, February 2, China Telecom Heilongjiang Company recently, the Ministry of Industry and Information Technology released 2014 years of software industry performance report. The report shows that 2014, China's software and information technology services industry to achieve software business income of 3.7 trillion yuan, an increase of 20.2%. In addition, February 2, China Telecom Heilongjiang Company ...

Is the information in symmetric encryption more secure than the information in PGP?

Q: Suppose two people use symmetric encryption to exchange information, and each time they communicate, the session key is generated, encrypting information using protocols such as SSL that process the session key. In addition, they can exchange information using PGP, a mail encryption software based on the RSA public key encryption system. Which encryption method do you think is more secure in this case, PGP or symmetric encryption? A: It depends on the degree of trust you have in your local environment. Symmetric encryption encrypts all packets between mail servers by using a shared encryption key to ensure that information between systems is not compromised. PG ...

Arouse the outside speculation, the new Apple will show the mysterious veil

A press conference will be held on September 10 to arouse speculation that the new Apple will unveil a mysterious veil.   As the concept stocks in the A-share market rose to the wind, 01282,HK, the Hong Kong market that dabbled in fingerprint biometrics, rose to the comparable of HK $0.1/share from the middle of last year to a recent high of HK $0.69/share. Recently, the reporter learned that the world's science and Technology issued a notice, will be nearly 40 million Hong Kong dollars to subscribe to Norway from ...

Will the iphone's new phone use fingerprint identification technology?

Abstract: Will be held on September 10, caused by various outside speculation, the new Apple will show the veil of Mystery, the iphone new phone will use fingerprint identification technology?   In a share market related concept stocks rose to the wind, the Hong Kong market finger fingerprints will be held on September 10, caused by various speculation, the new Apple will show the mystery of the veil, the iphone new phone will use fingerprint identification technology? In the share market related concept stocks rose to the wind, the city of Hong Kong ...

IBM is "Digging the corner"

Absrtact: Yesterday, there is news that the tide plans to replace IBM's server business in China, there are more than 80 IBM employees to jump to the tide. Wave Group to the Beijing News reporter confirmed this matter is true. As of yesterday, Wave group's wave software has been trading for three consecutive days. Yesterday, there is news that the wave plan to replace IBM's server business in China, there are more than 80 IBM employees to jump to the tide. Wave Group to the Beijing News reporter confirmed "this matter is true."   As of yesterday, Wave group's wave software has been trading for three consecutive days. IBM was "digging the corner" in China ...

Total Pages: 4 1 2 3 4 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.