Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
TeliaSonera sells black boxes to dictators
While the UK awaits details on how the proposed Communications Bill will force service providers to monitor internet and phone metadata, Sweden’s TeliaSonera shows how it could be done by selling black boxes to authoritarian states.
May 21, 2012
Indian CERT handled over 13,000 cybersecurity incidents in 2011
The Indian Computer Emergency Response Team (CERT-In) handled 13,301 cybersecurity incidents in 2011, up from 10,315 incidents in 2010 and 8,266 incidents in 2009.
May 21, 2012
Sensitive data on British Army snipers end up in trunk of used car
Sensitive information about British Army snipers was found in the trunk of a used car, according to press reports.
May 21, 2012
BYOD threatens job security at HP
BYOD isn’t simply a security issue – it’s a job issue. Sales of multi-function smartphones and tablets are reducing demand for traditional PCs; and this is hitting Hewlett Packard.
May 18, 2012
Who attacked WikiLeaks and The Pirate Bay?
This week both the The Pirate Bay and WikiLeaks have been ‘taken down’ by sustained DDoS attacks: TPB for over 24 hours, and Wikileaks for 72. What isn’t known is who is behind the attacks.
May 18, 2012
Understanding the legal problems with DPA
We have known for many years that the EU is not happy with the UK’s implementation of the Data Protection Directive – what we haven’t known is why. This may now change thanks to the persistence of Amberhawk Training Ltd.
May 18, 2012
China's ZTE admits to backdoor in mobile phone model
China mobile phone maker ZTE admitted that one of its mobile phone models sold in the US contains a backdoor that could enable someone to take control of the device.
May 18, 2012
Opfake malware being disguised in Android games
Symantec researchers recently discovered several dummy sites being used to peddle the Android.Opfake malware, which is being disguised as games such as Temple Run and Cut the Rope.
May 18, 2012
Vulnerability found in Mobile Spy spyware app
Mobile Spy is covert spyware designed to allow parents to monitor their children’s smartphones, employers to catch time-wasters, and partners to detect cheating spouses. But vulnerabilities mean the covertly spied-upon can become the covert spy.
May 17, 2012
25 civil servants reprimanded weekly for data breach
Government databases are full of highly prized and highly sensitive personal information. The upcoming Communications Bill will generate one of the very largest databases. The government says it will not include personal information.
May 17, 2012
US firms team with German institute on cybersecurity center
US high-tech firms have teamed with German research institute Fraunhofer FOKUS to open a cybersecurity research center in Berlin.
May 17, 2012
UK council objects to ICO fine for data loss resulting from burglary
A UK council is objecting to a 70,000-pound fine levied by the Information Commissioner’s Office (ICO) for losing sensitive data as the result of a theft at an employee’s home.
May 17, 2012
Prev
1
...
5110
5111
5112
5113
5114
5115
5116
5117
5118
...
5318
Next