• Wednesday
  • September 3, 2014
  • Last updated: 4:47pm
Hong Kong




Refine Your Search

Sort by

Related Keywords

Search Results

Results 1 - 10 of 28 for traffic

Search results

  1. News - Hong Kong - SECURITY

    Hong Kong police to stage ‘major exercise’ in preparation for Occupy Central

    Posted Jun 24th 2014, 02:49pm by Niall Fraser and Clifford Lo

    ... would deploy about 4,000 officers from the Police Tactical Unit, traffic divisions, patrol sub-units and emergency units along with auxiliary police officers. It is understood that the number ... traffic, occupy infrastructure facilities and block emergency access," the source said. The source added that July 1 would be considered as preparation for a massive operation to handle Occupy ...

  2. News - China - SECURITY

    Beijing on highest security alert after Urumqi suicide blast

    Posted May 02nd 2014, 01:28pm by Keira Lu Huang

    ... of security control. Its armed patrol now operates round the clock, focusing on the city’s central and popular areas as well as transportation hubs. Traffic police and special weapons and tactics ...

  3. News - World - SECURITY

    Edward Snowden reporters Glenn Greenwald, Laura Poitras back in US

    Posted Apr 13th 2014, 06:00am by AP

    ... be arrested upon arriving at New York's Kennedy airport. They were instead confronted by only reporters and photographers before fighting through traffic en route to a Manhattan hotel to receive ...

  4. News - China - SECURITY

    False reports of knife attacks spark panic in Guangzhou and Chengdu

    Posted Mar 16th 2014, 05:00am by AP

    ... strengthened security in areas with heavy traffic, such as malls, transport hubs and popular tourist sites. ...

  5. News - World - SECURITY

    NSA posed as Facebook to infect computers with malware, says report

    Posted Mar 13th 2014, 11:11pm by NYT

    ... networks may still be vulnerable to those types of attacks. "This method of network-level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating ... have its traffic misdirected." Other ways the NSA infects computers with malware include sending out spam e-mails. The NSA is capable of installing different kinds of malware, each capable ...

  6. Lifestyle - Technology - SECURITY

    Apple security flaw allows spies and hackers to beat encryption

    Posted Feb 24th 2014, 04:48am by Reuters

    ... that those certificates were not authenticated at all, so that hackers can impersonate the website being sought and capture all the electronic traffic before passing it along to the real site. ...

  7. News - World - SECURITY

    Spying on mobile apps shows risks millions take each day in using them

    Posted Feb 02nd 2014, 05:12am by Bloomberg

    ... millions of Americans’ daily calling records into a central agency database. When the agency wants to review telephone traffic associated with a suspected terrorist – the agency made 300 ... didn’t respond to e-mail messages. The NSA sensors that capture traffic travelling across key internet junctures are probably what allow the agency to collect mobile ad data and look ...

  8. News - World - SECURITY

    US technology giants issue letter to Barack Obama urging surveillance reform

    Posted Dec 10th 2013, 03:33am by AP

    ... provided by Snowden showed British and American intelligence officers have been spying on gamers across the world, deploying undercover officers to virtual universes and sucking up traffic from ...

  9. News - World - SECURITY

    I'm a patriot, says Guardian newspaper editor as he defends Snowden leaks

    Posted Dec 04th 2013, 05:08am by AFP

    ... revealed the existence of mass surveillance programmes such as GCHQ's Tempora, which taps into cables carrying internet traffic to and from the UK. "This stuff may be politically ...

  10. Lifestyle - Technology - SECURITY

    Deutsche Telekom offers secure smartphones after NSA snooping

    Posted Dec 01st 2013, 04:24am by GUARDIAN

    ... It wanted a solution that would encrypt data and eventually voice traffic on 10,000 civil servants' government-issue phones, both when they communicated with one another on the phones and when ... in late 2009. It could encrypt text messages and e-mail, but voice traffic was left unencrypted because, at the time, telecom providers thought the encryption built into their 3G networks ...




SCMP.com Account