One password to rule them all

Password breaches are happening all the time. Stories of hundreds of passwords being stolen litter the news on a daily basis. While having a single password stolen is not the end of the world, if you use one password for multiple accounts, particularly accounts that...

DCC offers WD Green 4Tb hard drive

Take advantage of low operating temperatures, low noise and a host of eco-friendly features, along with massive storage capacity, with the new 4Tb WD Green hard drives from distributor Drive Control Corporation (DCC). These cool, quiet drives use WD GreenPower...

IT security resolutions for 2014

Each new year brings a slew of new year’s resolutions, but these need to be remembered on an on-going basis, else they will be forgotten in the course of daily life. Whether it is going to the gym, quitting smoking, or cutting down on the booze, the list is long, and...

Understanding biometric identification

Biometrics refers to the identification of humans using their physical characteristics such as fingerprints, face recognition, DNA, palm print, hand geometry, iris recognition, retina and so on. It allows specialists to identify an individual in a far more secure...

Voice biometrics key for authentication

Voice biometrics is one of those technologies: it changes the game. It’s not in wide use anywhere in the world, yet, but it’s going to be the norm for authenticating identity within the next few years. It’s been worked on and refined for almost fifteen years. So it’s...

When adware becomes madware

As annoying as mobile malware is, it is far from the only security problem plaguing smartphone users across the globe. A threat that is starting to take centre stage, is “madware” – a new variety of mobile adware, which covers aggressive mobile advertising...