Home|Article
14 10, 2014

Securemetric USB Based Products Are Not Affected By BadUSB Vulnerability

By |2019-01-30T01:55:28+08:00October 14th, 2014|Article|Comments Off on Securemetric USB Based Products Are Not Affected By BadUSB Vulnerability

On the 7th of August 2014 at the Black Hat 2014, German security firm Security Research (SR) Labs revealed one of the first USB vulnerabilities known as BadUSB where this malware is designed to attack the device itself instead of the data on the device. This means that this malware is capable of reprogramming the [...]

14 04, 2014

Security advisory regarding Heartbleed OpenSSL vulnerability

By |2019-01-30T02:08:11+08:00April 14th, 2014|Article, News|Comments Off on Security advisory regarding Heartbleed OpenSSL vulnerability

Certainly many of you likely read about the Heartbleed vulnerability that has affected much of the Internet. On Monday April 7th, security researchers reported the so-called Heartbleed bug in OpenSSL, which is a cryptographic library implementing the SSL/TLS security protocol. What is the Heartbleed bug? The Heartbleed Bug is vulnerability in the OpenSSL cryptographic software [...]

30 04, 2013

iReader – One of the Best Designed and Built Mobile Smart Card Reader

By |2019-01-30T02:30:12+08:00April 30th, 2013|Article|Comments Off on iReader – One of the Best Designed and Built Mobile Smart Card Reader

Earlier this year Securemetric Technology introduced iReader, one of the few finest built and best designed mobile smart card reader available in the market with competitive pricing. With the rising number of mobile phones  penetration in every part of the world, Securemetric decided to take the opportunity to offer a mobile device capable of ID [...]

3 01, 2013

Preventive Security vs Detective Security

By |2019-01-30T02:34:21+08:00January 3rd, 2013|Article|Comments Off on Preventive Security vs Detective Security

Preventive Security vs Detective Security Making Your Workforce a Formidable Preventive Security Control Starting with a quote, “an ounce of prevention is worth a pound of detection” prevention is always seen as better than cure, of course we hear this mostly in medical related usages. The same concept can be applied to information security too. [...]

3 01, 2013

Modern Times Digital Wallet

By |2019-01-30T02:37:37+08:00January 3rd, 2013|Article|Comments Off on Modern Times Digital Wallet

In the last 10 to 15 years mobile phones have gone from communications devices intended mainly for business people to devices used by almost everyone. Today it is estimated that over 70% of the world's population uses mobile phones. Today, thanks to the phenomenon of smart phones and great application market, mobile phones are increasingly [...]

20 10, 2011

Common Frauds on e-Commerce

By |2019-01-30T03:42:59+08:00October 20th, 2011|Article|Comments Off on Common Frauds on e-Commerce

There are increasing electronic crimes or frauds online with increased e-Commerce population, very common sectors  being targeted by hackers are banks which involve direct monetary return if they got it through. Common Frauds or Crime reported are, Identity Thief This is where the hacker is trying to steal the credential from the user and pretend [...]

20 10, 2011

Soft Certificate vs Hardware based Certificates

By |2019-01-30T03:45:19+08:00October 20th, 2011|Article|Comments Off on Soft Certificate vs Hardware based Certificates

Public Key Infrastructure (PKI) Technology require issuance of digital certificates by the Certificate Authority to each valid user where the digital certificate will be needed whenever the user performing the PKI operations such as Login, Signing, etc. The effectiveness and security of any PKI system rely critically on the security of the certificates or perhaps [...]

20 10, 2011

Why need 2-Factor Authentication

By |2019-01-30T03:46:14+08:00October 20th, 2011|Article|Comments Off on Why need 2-Factor Authentication

As modern business environment today become more and more interconnected, the need for better and more sophisticated network security is of paramount importance. Simple user authentication systems, based on single username and password are insufficient and are too easily lost, stolen, shared and cracked. More sophisticates user authentication methods such as dynamic password generation, Smart [...]

20 10, 2011

About EAL4+ and IT SEC Certifications

By |2019-01-30T03:47:29+08:00October 20th, 2011|Article|Comments Off on About EAL4+ and IT SEC Certifications

Evaluation Assurance Level (EAL) The Evaluation Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999. The increasing assurance levels reflect added assurance requirements that must be met to achieve Common Criteria certification. [...]

20 10, 2011

Software based vs Hardware based Software License Protection

By |2019-01-30T03:50:44+08:00October 20th, 2011|Article|Comments Off on Software based vs Hardware based Software License Protection

Software License Protection is   the security solution where software developers use to integrate into their software applications with the intention to prevent unauthorized usage or illegal execution of their software. Software developers can either purchase Software License Protection solutions from third party solution providers or develop it in-house. Currently, there are 2 common Software License [...]