Button Up


"CES 2015 was a superb event in terms of the amount of new technologies per square foot, which have been referred to numerous times by reporters for tech websites. As for me, a person fully immersed in the world of information security, the show resulted in mixed feelings", - Evgeny Chereshnev, Chief Mobile Business Officer (CMBO) at Kaspersky Lab.
Code obfuscation provides quite efficient protection against software disassembly.
The main idea of copy protection is simple. You need to find an object that has two properties: the first, each end user should have it, and the second, it should be difficult to duplicate it. Usually such an object is called a binding object, because it is used to bind an e-document or a program to a definite end-user.
Anti-Malware.ru asks questions to Alexander Zatsepin, CTO at StarForce and Natalia Yashenkova, Head of Marketing and PR at StarForce. This interview continues cycle of publications titled “Persons of the Industry”.
The basic mathematical model for the dynamics of the number of legal and counterfeit customers of computer games and other innovative products is presented. The model is based on the information propagation and information warfare models. The analysis is conducted using the theory of ordinary differential equations. It is shown that results are in qualitative agreement with empirical data by Protection Technology Research company (PTR).
The popularity of electronic books has increased dramatically within the last five years as mobile devices have become widely spread.
Everyone who uses e-mail sometimes thinks about how well the transmitted information is protected from prying eyes. Indeed, a message to be transferred travels a long way between different computers and mobile devices before it reaches a recipient; the intentions of the owners of these devices are unknown.
This article describes hardware and software division on the mobile platform market. “Mobile platform” means mass handheld devices with an autonomous power source designated for solving a large variety of general tasks: entertainment, communications and business.
We use an email almost every day as a mean for sending important documents to other people. Usually we send documents outside the security perimeter of an organization. It means the documents are being sent to external recipients.
When you use electronic mail as a means of transferring important confidential information, several problems arise that concern the reliability of protection of such information against unauthorized viewing. Information security experts all around the world face the problem of secure transfer of data and documents attached to electronic messages.
Articles 1 - 10 of 27
First | Prev. | 1 2 3 | Next | Last All