<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IronKey.net.nz &#187; technology</title>
	<atom:link href="https://www.ironkey.net.nz/category/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ironkey.net.nz</link>
	<description>Buy Online – IronKey</description>
	<lastBuildDate>Sun, 23 Jun 2019 06:15:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.2</generator>
	<item>
		<title>Great technical review of the IronKey Personal D200</title>
		<link>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/</link>
		<comments>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/#comments</comments>
		<pubDate>Wed, 13 Apr 2011 01:45:18 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[D250]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[IronKey D200 Personal]]></category>
		<category><![CDATA[secure browsing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=135</guid>
		<description><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the IronKey Personal D200, a must-read for the techies among you. Key points: The encryption is hardware-based 256-bit AES validated by the National Institute of Standards and Technology  to meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the <strong><a href="http://www.ironkey.net.nz/products-page/ironkey-personal/d2001/" target="_blank">IronKey Personal D200</a></strong>, a must-read for the techies among you.</p>
<p>Key points:</p>
<ul>
<li>The encryption is <strong>hardware-based 256-bit  AES</strong> validated by the National Institute of Standards and Technology  to  meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by the U.S. government.</li>
<li>The <strong>IronKey</strong> goes the extra mile past the 256-bit encryption standard by using the FIPS 140-2 Level Three  criteria that make it  difficult to physically  tamper with the IronKey, including features such its rugged  metal casing and sealed internal components.</li>
<li>The system is safe from <strong>malware</strong> or cold-boot attacks because the drive  does not export AES encryption keys to the host PC. If anyone tries a  brute-force attack based on password guesses, after 10 incorrect  passwords all encrypted data is erased.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking attacks: how to protect yourself</title>
		<link>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/</link>
		<comments>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/#comments</comments>
		<pubDate>Fri, 08 Apr 2011 04:50:34 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[privacy]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=132</guid>
		<description><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm Epsilon was the target of a specific attack, allowing customers&#8217; confidential data to be exposed. The theft of the confidential information (in this case, email addresses) can enable hackers to use phishing to trick the customer into revealing further confidential information.  In this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm <strong>Epsilon</strong> was the target of a specific attack, allowing customers&#8217; confidential data to be exposed.</p>
<p>The theft of the confidential information (in this case, email addresses) can enable hackers to use <strong>phishing</strong> to trick the customer into revealing further confidential information.  In this case, this data could reveal where the customers, then the hacker could sucessfully direct the customer to a a website which looks like a legitimate banking site, but in truth, is not.</p>
<p>Practical steps you can take include checking new emails addresses against previous emails from the bank, warning family members (especially younger ones) about the dangers, and checking links in emails before you click on them.</p>
<p>View the full article <a href="http://www.kidglue.com/2011/04/07/how-does-the-epsilon-hacker-attack-affect-your-family/" target="_blank">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New cybercrime targets for 2011</title>
		<link>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/</link>
		<comments>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/#comments</comments>
		<pubDate>Fri, 04 Feb 2011 02:39:24 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[paypal]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[PC World]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=98</guid>
		<description><![CDATA[<p>PC World reports that the enterprise, rather than the consumer, will be the predicted cybercrime target for 2010. &#8220;As the new decade opens, cybercrime is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting consumer desktops to employees in the enterprise,&#8221; states the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.pcworld.com/article/217716/new_year_new_targets_in_cybercrime.html">PC World reports</a> that the <strong>enterprise</strong>, rather than the consumer, will be the predicted cybercrime target for 2010.</p>
<p>&#8220;As the new decade opens, <strong>cybercrime</strong> is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting <strong>consumer desktops</strong> to employees in the enterprise,&#8221; states the 2011 Cybercrime Trends Report.</p>
<p>What does this mean exactly? The volume of <strong>mobile downloads</strong> is expected to rise in 2011 to 25 billion applications, creating more of an opportunity for mobile devices, used by employees of major organisations with access to huge amounts of confidential data, could mean an easy back door for malware to reach into corporate enterprises.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey Enterprise How-To</title>
		<link>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/</link>
		<comments>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/#comments</comments>
		<pubDate>Fri, 14 Jan 2011 02:38:05 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[secure session service]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[review]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=58</guid>
		<description><![CDATA[<p>Secure Active UK provides a picture tutorial on the IronKey Enterprise, an option for companies or businesses with two or more IronKeys, which enable the administrator to fully control the devices including the ability to remotely disable and wipe the devices if necessary. Device logs are also available so that companies can be in control [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/">IronKey Enterprise How-To</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Secure Active UK</strong> provides a picture tutorial on the <a href="http://www.ironkey.net.nz/index.php?cPath=249"><strong>IronKey Enterprise</strong></a>, an option for companies or businesses with two or more IronKeys, which enable the administrator to fully control the devices including the ability to remotely disable and wipe the devices if necessary. Device logs are also available so that companies can be in control of what their employees are doing.</p>
<p>Complete with screenshots, the Secure Active review provides a step by step look at how the Enterprise works.</p>
<p>View the article <a href="http://blog.securityactive.co.uk/2010/01/14/ironkey-s200-enterprise-review/">here.</a></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/">IronKey Enterprise How-To</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/01/14/ironkey-enterprise-how-to/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
