News

Mobile devices sometimes get lost. A laptop bag gets left on the bus or train, a smartphone slips out of your pocket, or a ...
Take these preemptive steps to protect your data and make your laptop more recoverable in case it's ever lost or stolen.
Email hackers are the ones to be concerned about, but thieves are the ones who make you worried about your data security when ...
The US Department of Commerce's technical standards organization NIST has nominated the Ascon group of cryptographic algorithms for protecting small devices and information transmitted to and from IoT ...
Encryption is the secret sauce that keeps private information private as it travels across the internet. Apps like Apple’s iMessage use it to protect the contents of your communication, as do other ...
Taking the time to review network encryption settings other than those in BitLocker needs much more review and examination to ensure thorough and consistent security. When we think about encryption ...
The traditional and well-established approach to cyber security is to build multiple layers of defences to stop hackers or rogue insiders getting unauthorised access to data. But you only have to ...
In a paper published Thursday, researchers illustrated how to access a computer's memory and scan the secret encryption keys used to scramble files. The report, titled "Lest We Remember: Cold Boot ...
The articles about proliferating USB data storage devices in a variety of shapes prompted a fair amount of e-mail, including a pointer from one reader who gave me the URL for a sampler of, ah, ...