Gateway to secure transactions

Monday, 17 April 2006, 2:35 AM EST

Product launches of technology behemoths are usually a grand affair with much fanfare and a lot of hype. A case in point could be that of biometric technologies leading the trend. Whether it's IBM's recent launch of select models of its ThinkPad Series, Toshiba's new range of notebooks, Fujitsu-Siemens' Tablet PC or Hewlett-Packard's select models of notebooks, the same ambience set in with a significant difference — hype emerged as a ray of hope for biometrics and made it a rapidly evolving technology.

At the Financial Express.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //