Button Up

Blog

The Server of Hitachi Payment Systems Infected ATMs of India and compromised millions of cards

21 Feb 2017
Svetozar Yakhontov
Svetozar Yakhontov
In mid-2016 one of the servers of Hitachi Payment Systems was attacked by malicious software, by which the criminals got data from the ATMs of State Bank of India, HDFC Bank, ICICI Bank, Yes Bank and Axis Bank. Currently, 19 banks and 641 customers noticed fraudulent activities with the cards. To reduce risks the banks have blocked compromised cards and advised its customers to change the PIN.

Periodic License Confirmation. Why You Need It

9 Feb 2017
Pavel Korobov
Pavel Korobov
If you create unique software products or documents, it is natural to have a wish to control their distribution. There are many tools to protect information from unauthorized actions of unscrupulous users. One of them is the periodic license confirmation.

Copy Protection for HTML Documents

23 Jan 2017
Natalia Yashenkova
Natalia Yashenkova
HTML is the standard markup language for creating web pages and web applications to be viewed via a browser. Usually HTML is used for internet sites, but some HTML applications such as interactive multimedia books, manuals, education materials, can work offline – people save them on the computer and use them without the internet. Of course it is possible to use PDF, but HTML is much richer – you can use video, audio, animated pictures, interactive components in JavaScript and many other things in one user interface.

New Year is a New Story

28 Dec 2016
Natalia Yashenkova
Natalia Yashenkova
New Year is not just a night after which we hang a new calendar on the wall. It’s time to take stock and set new tasks.

How to prevent others from copying and editing your documents

20 Dec 2016
Natalia Yashenkova
Natalia Yashenkova

Protection is most often necessary for professional documents. For example analytical agencies, design offices and other companies offering intellectual and creative products as a rule give the customers their documents in a protected format to prevent unauthorized use and sharing. For businesses it is also important to provide protection against document forgery, certain documents need to stay unchanged forever. 

However, protection against copying and editing can also be useful for personal purposes, for example, when you wrote a book, prepared a unique learning course, or if you provide consulting services. It means that such functionality can be useful to anyone who develops any intellectual products and wants to control their distribution.

8 Reasons Why StarForce Reader Better Than Adobe Acrobat Reader

26 Oct 2016
Pavel Korobov
Pavel Korobov
PDF is one of the most popular formats for electronic documents. The only drawback is that you need to install additional software to read documents. So what is the program can deal with it in the best way?

Remote Banking Will Add $3.7 Trillion to the GDP of Emerging Economies

27 Sep 2016
Svetozar Yakhontov
Svetozar Yakhontov
According to McKinsey Global Institute report 2 billion individuals and 200 million micro, small, and midsize businesses in emerging economies today lack access to savings and credit. Remote banking could increase the GDPs of all emerging economies by 6 percent, or a total of $3.7 trillion, by 2025. This growth includes benefits from the use of digital finance instead of traditional, and investments in business development in this area that in its turn will create up to 95 million new jobs across all sectors of the economy.  

How to Protect Corporate and Private Bulk Emails

22 Sep 2016
Pavel Korobov
Pavel Korobov
Do you want to protect emailings intended for a limited number of recipients from being forwarded to  third parties and monitor & control the number of times the mails are opened?

Protection of corporate documents outside the perimeter of the enterprise information system

25 Jul 2016
Natalia Yashenkova
Natalia Yashenkova
Every company has a range of tasks connected with protection of electronic documents from leakage and unauthorized use. And now BYOD became a serious threat because it blurs the perimeter of the enterprise information system. A company can forbid using mobile devices but it entails slowing business processes in the short term and loss of income in the long term. There is also a necessity to share different documents with people outside the perimeter, e.g. auditors, stakeholders, partners, consultants. Is there a possibility to continue to control documents which have left the company’s border?

StarForce on Guard of Games!

29 Jun 2016
Natalia Yashenkova
Natalia Yashenkova
StarForce became famous thanks to reliable game protection against piracy. And for today publishers and developers of games are our main clients. Some statistics for you: last month we had about 50000 activations all over the world and 87% of it is related with games.

Pages: 1 2 3 Next All