Among the technologies it accused Steve Jobs and his team of "borrowing" were wireless data, speech coding, security and encryption.
Installing security and encryption solutions (are another) way to do it.
The latest, put forward by Frank Rieger, a researcher at security and encryption firm GSMK, posits in a Frankfurt newspaper ( translation here) and on his blog that Stuxnet targetted a nuclear enrichment facility in the Iranian town of Natanz.
FORBES: Theories Mount That Stuxnet Worm Sabotaged Iranian Nuke Facilities
But the Justice Department and the FBI want Congress to pass a quite different bill, one, which would make it easier for them secretly to gain access to suspects' computers in their homes, to gather passwords, to install "recovery devices" and to disable encryption and security software.
At the heart of the matter is DirecTV's desire to bring the management and encryption of its security cards in-house.
AOL, which will eventually add data-encryption, content-security and trusted-partner features to their own messaging software.
MacKeeper is a suite of 16 software utilities including Internet security, file recovery, data encryption and back-up.
FORBES: Thoughts on Three Potentially Disruptive Companies at MacWorld
Matt Pauker is a co-founder of Voltage Security, a provider of enterprise software and encryption services.
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
For the business user the X1 Carbon Touch provides peace of mind for any situation with state of the art security and manageability including vPro, Integrated Fingerprint Reader, Trusted Platform Module and BIOS encryption.
ENGADGET: Lenovo announces the ThinkPad X1 Carbon Touch, available now for $1,399 and up
The new technique may serve as a wake-up call for mobile carriers, which have long been in denial about the vulnerabilities of GSM security, says Bruce Schneier, encryption guru and chief technology officer of BT Counterpane.
After his initial foray into computers, Assange delved into computer encryption and grew keen on computer security.
Motorola PHOTON Q is Business Ready with full corporate security including remote wipe, pin lock, and data encryption.
ENGADGET: Sprint's Motorola Photon Q LTE is coming 'very soon' (update)
And security tools really don't help here, Goldsmith says, although strong firewalling and external session-layer encryption are helpful.
For security, Airport Extreme employs 128-bit WEP encryption and comes with its own firewall.
Other features include full data path protection, embedded AES (Advanced Encryption Standard) engines for data security, and other resource optimization features.
ENGADGET: BiTMICRO's next-gen SSD controller to deliver blazing speed and big storage in 2012
And for the ultimate in security, AES 256-bit encryption prevents unauthorised file access to the key with password protection.
ENGADGET: Lacie USB 3.0 RuggedKey now shipping: $40 for 16GB, $70 for 32GB
Some commonly used digital cellular telephones are designed with encryption capabilities and must be certified by the Federal Security Service.
FORBES: Russia's FSB Receives Decrypted BlackBerry Messages From Mobile TeleSystems
Export of software from the U.S., including software that deploys encryption functions, is controlled by the Bureau of Industry and Security ( BIS) in accordance with the Export Administration Regulations ( EAR).
FORBES: As Inflation Rages In Iran, Bitcoin Software Not Available
What about requiring every third-party service provider to protect personal customer data through encryption, tokenization or another advanced security technology, through clauses written into and enforced as part of standard service level agreements?
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
All of these systems provide for encryption capabilities as another layer of security, assuming the option is turned on and actually utilized by different agencies and operatives.
FORBES: Free Speech v. Denial Of Communications For Public Safety Agencies?
Hirai went on to talk vaguely about increased security measures aimed at preventing future hacks, including upgraded encryption, more firewall protections, and an early warning system to detect attacks.
"The worry is that adding any encryption would hit performance, and performance is everything, " said one security director of a financial institution attending the talk, who asked not to have his name or employer revealed.
PUFs are an innovative way of safeguarding individual chips from data theft by using the unique 'fingerprint' inherent in every semiconductor device to protect its encryption key, making it very hard to clone and thus reverse-engineer and compromise security microcontrollers.
ENGADGET: NXP's silicon fingerprinting promises to annoy the heck out of ID hackers
No security code will ever foil a determined hacker with a supercomputer and a lot of time on his hands, but soon encryption should be adequate to placate most people.
应用推荐