^
+ Follow encryption Tag
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 2133584
                    [Title] => Encryption: Why security threats coast under the radar
                    [Summary] => The best way to address these issues is to have an automated solution that can proactively monitor and analyze encrypted data.
                    [DatePublished] => 2021-10-14 09:29:00
                    [ColumnID] => 0
                    [Focus] => 1
                    [AuthorID] => 
                    [AuthorName] => 
                    [SectionName] => Technology
                    [SectionUrl] => technology
                    [URL] => https://media.philstar.com/photos/2021/10/12/acw-lead_2021-10-12_09-53-05957_thumbnail.jpg
                )

            [1] => Array
                (
                    [ArticleID] => 1263058
                    [Title] => Techies vs. NSA: Encryption arms race escalates
                    [Summary] => 

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs.

[DatePublished] => 2013-12-01 02:22:46 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1500716 [AuthorName] => Martha Mendoza [SectionName] => World [SectionUrl] => world [URL] => ) [2] => Array ( [ArticleID] => 1182911 [Title] => US military cracked most online encryption [Summary] =>

The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data safe from prying eyes, according to published reports Thursday based on internal U.S. government documents.

[DatePublished] => 2013-09-07 04:10:47 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1367010 [AuthorName] => Jack Gillum [SectionName] => World [SectionUrl] => world [URL] => http://img839.imageshack.us/img839/6094/09f5.jpg ) [3] => Array ( [ArticleID] => 602946 [Title] => Threats of int'l BlackBerry bans echo US debate [Summary] =>

Threats by the governments of India, the United Arab Emirates and Saudi Arabia to shut down BlackBerry's corporate e-mail services reflect unease about a technology that the US government also took a while to accept.

[DatePublished] => 2010-08-16 04:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => [SectionUrl] => [URL] => ) [4] => Array ( [ArticleID] => 230309 [Title] => Comelec’s vote-counting machines protected from hackers — Supplier [Summary] => The automated counting machines (ACMs) to be used by the Commission on Elections (Comelec) in the May 2004 polls are highly secured and cannot be hacked because of their advanced security protection, the machine supplier maintained yesterday.
[DatePublished] => 2003-12-04 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Headlines [SectionUrl] => headlines [URL] => ) [5] => Array ( [ArticleID] => 216533 [Title] => New 3Com wireless solution [Summary] => NEW YORK CITY – 3Com Corp. recently unveiled its new family of fully complaint 802.11g wireless offerings – the 3Com OfficeConnect Wireless 11g solution.

3Com’s new 802.11g wireless solution is ideally suited for the small or home office as well as emerging enterprises and wireless "hot spots."
[DatePublished] => 2003-08-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
encryption
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 2133584
                    [Title] => Encryption: Why security threats coast under the radar
                    [Summary] => The best way to address these issues is to have an automated solution that can proactively monitor and analyze encrypted data.
                    [DatePublished] => 2021-10-14 09:29:00
                    [ColumnID] => 0
                    [Focus] => 1
                    [AuthorID] => 
                    [AuthorName] => 
                    [SectionName] => Technology
                    [SectionUrl] => technology
                    [URL] => https://media.philstar.com/photos/2021/10/12/acw-lead_2021-10-12_09-53-05957_thumbnail.jpg
                )

            [1] => Array
                (
                    [ArticleID] => 1263058
                    [Title] => Techies vs. NSA: Encryption arms race escalates
                    [Summary] => 

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs.

[DatePublished] => 2013-12-01 02:22:46 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1500716 [AuthorName] => Martha Mendoza [SectionName] => World [SectionUrl] => world [URL] => ) [2] => Array ( [ArticleID] => 1182911 [Title] => US military cracked most online encryption [Summary] =>

The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data safe from prying eyes, according to published reports Thursday based on internal U.S. government documents.

[DatePublished] => 2013-09-07 04:10:47 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1367010 [AuthorName] => Jack Gillum [SectionName] => World [SectionUrl] => world [URL] => http://img839.imageshack.us/img839/6094/09f5.jpg ) [3] => Array ( [ArticleID] => 602946 [Title] => Threats of int'l BlackBerry bans echo US debate [Summary] =>

Threats by the governments of India, the United Arab Emirates and Saudi Arabia to shut down BlackBerry's corporate e-mail services reflect unease about a technology that the US government also took a while to accept.

[DatePublished] => 2010-08-16 04:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => [SectionUrl] => [URL] => ) [4] => Array ( [ArticleID] => 230309 [Title] => Comelec’s vote-counting machines protected from hackers — Supplier [Summary] => The automated counting machines (ACMs) to be used by the Commission on Elections (Comelec) in the May 2004 polls are highly secured and cannot be hacked because of their advanced security protection, the machine supplier maintained yesterday.
[DatePublished] => 2003-12-04 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Headlines [SectionUrl] => headlines [URL] => ) [5] => Array ( [ArticleID] => 216533 [Title] => New 3Com wireless solution [Summary] => NEW YORK CITY – 3Com Corp. recently unveiled its new family of fully complaint 802.11g wireless offerings – the 3Com OfficeConnect Wireless 11g solution.

3Com’s new 802.11g wireless solution is ideally suited for the small or home office as well as emerging enterprises and wireless "hot spots."
[DatePublished] => 2003-08-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with