|Article
30 04, 2013

iReader – One of the Best Designed and Built Mobile Smart Card Reader

By |2019-01-30T02:30:12+08:00April 30th, 2013|Article|Comments Off on iReader – One of the Best Designed and Built Mobile Smart Card Reader

Earlier this year Securemetric Technology introduced iReader, one of the few finest built and best designed mobile smart card reader available in the market with competitive pricing. With the rising number of mobile phones  penetration in every part of the world, Securemetric decided to take the opportunity to offer a mobile device capable of ID [...]

3 01, 2013

Preventive Security vs Detective Security

By |2019-01-30T02:34:21+08:00January 3rd, 2013|Article|Comments Off on Preventive Security vs Detective Security

Preventive Security vs Detective Security Making Your Workforce a Formidable Preventive Security Control Starting with a quote, “an ounce of prevention is worth a pound of detection” prevention is always seen as better than cure, of course we hear this mostly in medical related usages. The same concept can be applied to information security too. [...]

3 01, 2013

Modern Times Digital Wallet

By |2019-01-30T02:37:37+08:00January 3rd, 2013|Article|Comments Off on Modern Times Digital Wallet

In the last 10 to 15 years mobile phones have gone from communications devices intended mainly for business people to devices used by almost everyone. Today it is estimated that over 70% of the world's population uses mobile phones. Today, thanks to the phenomenon of smart phones and great application market, mobile phones are increasingly [...]

20 10, 2011

Common Frauds on e-Commerce

By |2019-01-30T03:42:59+08:00October 20th, 2011|Article|Comments Off on Common Frauds on e-Commerce

There are increasing electronic crimes or frauds online with increased e-Commerce population, very common sectors  being targeted by hackers are banks which involve direct monetary return if they got it through. Common Frauds or Crime reported are, Identity Thief This is where the hacker is trying to steal the credential from the user and pretend [...]

20 10, 2011

Soft Certificate vs Hardware based Certificates

By |2019-01-30T03:45:19+08:00October 20th, 2011|Article|Comments Off on Soft Certificate vs Hardware based Certificates

Public Key Infrastructure (PKI) Technology require issuance of digital certificates by the Certificate Authority to each valid user where the digital certificate will be needed whenever the user performing the PKI operations such as Login, Signing, etc. The effectiveness and security of any PKI system rely critically on the security of the certificates or perhaps [...]

20 10, 2011

Why need 2-Factor Authentication

By |2019-01-30T03:46:14+08:00October 20th, 2011|Article|Comments Off on Why need 2-Factor Authentication

As modern business environment today become more and more interconnected, the need for better and more sophisticated network security is of paramount importance. Simple user authentication systems, based on single username and password are insufficient and are too easily lost, stolen, shared and cracked. More sophisticates user authentication methods such as dynamic password generation, Smart [...]

20 10, 2011

About EAL4+ and IT SEC Certifications

By |2019-01-30T03:47:29+08:00October 20th, 2011|Article|Comments Off on About EAL4+ and IT SEC Certifications

Evaluation Assurance Level (EAL) The Evaluation Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999. The increasing assurance levels reflect added assurance requirements that must be met to achieve Common Criteria certification. [...]

20 10, 2011

Software based vs Hardware based Software License Protection

By |2019-01-30T03:50:44+08:00October 20th, 2011|Article|Comments Off on Software based vs Hardware based Software License Protection

Software License Protection is   the security solution where software developers use to integrate into their software applications with the intention to prevent unauthorized usage or illegal execution of their software. Software developers can either purchase Software License Protection solutions from third party solution providers or develop it in-house. Currently, there are 2 common Software License [...]

20 10, 2011

Tips and Tricks on optimizing Software License Protection Dongle

By |2019-01-30T03:52:06+08:00October 20th, 2011|Article|Comments Off on Tips and Tricks on optimizing Software License Protection Dongle

To achieve maximum security of Software License Protection Dongle, one must first understand the core protection concept of the chosen Dongle and plan ahead on how to utilize the provided security features into their protection before actual integration. Below are some useful tips and tricks on optimizing protection in Software License Protection Dongle. Combining API [...]

20 10, 2011

Common Attacks on Software License Protection Dongle

By |2019-01-30T03:54:25+08:00October 20th, 2011|Article|Comments Off on Common Attacks on Software License Protection Dongle

Today’s technology advancement not only brought us many innovative and advanced protection options on Software License Protection Dongles but also threaten us with many possible new attacks to make such protection no longer meaningful. Before selecting the right product, one must understand what could be the possible threats and make sure the selected product can [...]