Similar Articles |
|
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
InternetNews December 31, 2008 Richard Adhikari |
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. |
PC World August 13, 2002 David Legard |
Severe Security Flaw Found in IE Microsoft acknowledges potential SSL vulnerability, uncovered by security researcher. |
JavaWorld January 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... |
JavaWorld April 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... |
InternetNews December 30, 2008 Richard Adhikari |
Certificate Flaw May Threaten Secure Web Sites Researchers say they've found a weakness in a common cryptography technology used in the digital certificates that protect many secure online transactions. |
Popular Mechanics February 2007 Joel Johnson |
Secure Sockets Layer Explained: Tech Clinic What Secure Sockets Layer (SSL) is and how it works to secure Internet transactions. |
InternetNews March 24, 2011 |
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. |
PC World August 19, 2002 John Fontana |
Debate Flares Over Microsoft's SSL Glitch Software giant says flaw would be difficult to exploit, but some security experts disagree. |
InternetNews July 30, 2009 |
Kaminsky Warns of SSL Vulnerabilities Security researcher Dan Kaminsky made waves last year with his dramatic DNS security flaw that could have undermined the security of the Internet. This year at Black Hat, he's back with another critical issue affecting the security certificates that secure Web sites. |
InternetNews December 31, 2003 Susan Kuchinskas |
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? |
PC World March 22, 2001 Cameron Crouch |
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... |
PC World October 24, 2007 Erik Larkin |
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. |
InternetNews July 9, 2004 Sean Michael Kerner |
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. |
InternetNews August 4, 2009 |
Mozilla Patches Firefox for Black Hat Flaws Firefox 3.5.2 and 3.0.13 fix issues new and old in the open source browser. |
InternetNews February 20, 2009 Sean Michael Kerner |
Facial Recognition Gets a Black Eye at Black Hat Researcher demonstrates how easy it is to defeat biometric security on major vendors' notebooks. |
Bank Technology News September 2009 Rebecca Sausner |
SSL Comes Under Fire at Black Hat It's great to see signs of life in the corporate world, even if it's investment in the kind of defensive education that CISOs and their teams get when they travel to a security conference like Black Hat. |
InternetNews December 16, 2005 Sean Michael Kerner |
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. |
PC World August 15, 2002 John Fontana |
Microsoft: SSL Flaw in Windows, Not IE Researchers said browser was insecure, but now software giant says it's the OS that must be patched. |
InternetNews August 4, 2004 Ryan Naraine |
Mozilla: Dollars for Security Bugs The open source browser project puts up a bounty for the discovery of 'critical' security flaws. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
InternetNews July 20, 2009 |
How Did Symbian OK Mobile Phone Malware? The Symbian mobile OS is used by millions of phones globally and thanks to a (now corrected) oversight they could have potentially installed malware - with Symbian's approval. |
PC Magazine March 15, 2006 Robert Lemos |
The Wireless Snare Right now your laptop could be wirelessly connecting to any available network. That's unsafe. |
InternetNews March 6, 2007 Andy Patrizio |
Lenovo, Avaya Team For IP Phone Integration PC maker Lenovo and IP telephony vendor Avaya today announced a collaboration to integrate Avaya's IP-based soft phones into Lenovo's ThinkPad laptops. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
InternetNews October 16, 2006 Andy Patrizio |
New ThinkPads Encrypt The Entire Drive Lenovo is offering a new line of ThinkPad notebooks that will secure the entire contents of the hard drive with the swipe of a finger. |
InternetNews May 10, 2007 Stuart J. Johnston |
Lenovo and Microsoft Extend China Bundling Deal Lenovo announced Thursday it has signed a deal whereby the largest Chinese computer maker will continue to ship fully licensed copies of Windows and other Microsoft products on all PCs sold inside China. |
PC Magazine October 5, 2004 Neil J. Rubenking |
Security Certificates Suddenly Invalid I have a glitch in Internet Explorer 6 that seems to have come out of nowhere. |
JavaWorld March 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. |
JavaWorld December 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. |
Fast Company November 22, 2011 Chuck Salter |
Protect And Attack: Lenovo's New Strategy Once an unlikely rival for HP and Apple, Chinese computer maker Lenovo has grown and adapted as quickly as its homeland. Now, with a savvy blend of East and West, it's poised to be China's first global brand. |
InternetNews September 8, 2009 |
Mozilla to Update Firefox for Flash Security In the next round of updates due out this month, Firefox will check the Flash version number and advise users to update if they've got an out-of-date version. |
JavaWorld February 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. |
InternetNews January 3, 2008 |
From Lenovo, a PC That Recognizes You Lenovo Group introduced its first consumer computers in the United States on Wednesday, expanding in a region it entered in 2005 with the purchase of IBM's PC business. |
InternetNews April 11, 2006 David Miller |
Lenovo Reaches Small Business Through Retail Lenovo announced on Tuesday that it is partnering with electronics retailer Best Buy to sell Lenovo computers at select stores across the U.S. |
InternetNews December 8, 2004 Michael Singer |
IBM Sells PC Business to Lenovo Big Blue makes its exit from the desktop but keeps a stake in China's Lenovo. |
InternetNews November 30, 2006 David Needle |
PC Companies Tout Vista Enhancements Lenovo, Dell, and HP said they're ready to launch Vista-related software. |
InternetNews September 15, 2005 Erin Joyce |
Lighter ThinkPads, Weighty Goals Lenovo's latest ThinkPad laptop release, the Z60 series, may be lighter than ever, but it carries weighty ambitions for the number three computer maker. |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
PC Magazine May 18, 2005 Michael J. Miller |
Competition in Web Browsers Heats Up Remember the browser wars from a few years back?... Evolving PC Magazine... ThinkPads in China... |
InternetNews February 23, 2006 Erin Joyce |
Lenovo Launches Low-Cost PCs For Businesses Retail and channel-selling strategy is all part of the world's third-largest PC maker's plan to grab market share among small businesses in U.S. |
InternetNews October 26, 2009 |
Lenovo Makes Consumer Push With 'Idea' Line Lenovo touts its enhanced Windows 7 support as providing a superior experience over other laptops and desktops. |
PC World June 2006 Kalpana Ettenson |
Lenovo's New Budget Laptop Is Bland but Solid This Low-cost, all-purpose Lenovo 3000 C100 laptop is speedy, but its design won't dazzle. |
InternetNews February 15, 2006 Erin Joyce |
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. |
InternetNews June 28, 2010 |
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? |
BusinessWeek May 29, 2006 Stephen H. Wildstrom |
Three Thoroughbred Laptops Dell, HP, and Lenovo have similar specs and are capable performers, but Lenovo has an edge in software. |
InternetNews March 31, 2005 Michael Singer |
Lenovo Gets Infusion of U.S. Cash The Chinese company poised to take over IBM's legendary PC business sees $350 million deposited in its coffers. |
InternetNews May 2, 2005 Michael Singer |
China's Lenovo Takes Over IBM PCs Lenovo Group signals that it will ship new IBM PC products in a few weeks. |
U.S. CPSC November 12, 2008 |
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. |