Posted on 08 September 2011 by
An interesting debate has been open on NFC mobile payments services moving from hardware to software-based solutions. But with the risk of an increase in fraud is still a main concern. We feel that software coupled with hardware-based authentication might be the answer.
Posted on 18 May 2012 by
As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS system. I took some heat for my decision to return to a PC from my Mac […]
Posted on 20 November 2012 by
What springs to mind when you think of McDonalds? Happy meals? Brightly colored fast-food chains? Sponsorship of the 2012 Olympics? Vegetarian-only restaurants in India? How about Machine-2-Machinecommunication? Surprised? McDonalds has pioneered a key business concept – extended enterprise – which is going to be the cornerstone of future M2M Communications. What is an extended enterprise? […]
Posted on 01 February 2013 by
Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password. Why? Because the password “Th3r3 can only b3 #1!” has grammatical […]
Posted on 03 October 2014 by
What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?
Posted on 02 November 2016 by
Software localization increases your market around the world. Here are some things you should be aware of before starting.