- Tutorial: How to fix app store errors in Windows 8
- How to fix the two-factor authentication log-in error in Gmail on Android
- 10 open source e-learning projects to watch
- How to fight back against CryptoLocker
So Australians probably don't need to worry about getting their kneecaps broken if they don't hand over their private encryption keys just yet, but the Australian Crime Commission wants changes to the law in order to make it easier for law enforcement to decrypt secret communications.
By Rohan Pearce | 23 April, 2014 10:59
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
By Lucian Constantin | 19 April, 2014 03:20
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
By Lucian Constantin | 18 April, 2014 03:15
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
By Lucian Constantin | 17 April, 2014 02:27
VMware started patching its products against the critical Heartbleed flaw that puts encrypted communications at risk, and plans to have updates ready for all affected products by Saturday.
By Lucian Constantin | 16 April, 2014 00:48
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trade secrets, marketing plans, and other competitive information that could have long-term business damage, plus the immediate costs of having to notify people if their personal information was possibly at risk from the breach. Particularly in a recession, enterprise management can't afford to take these risks lightly.
By Mel Beckman | 20 January, 2009 08:55
Whitepapers about encryption
As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTContent StrategistNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTDeliverability SpecialistNSW
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
- Automated call scam targets Qantas customers
- Megaupload seeks return of millions in frozen Hong Kong assets
- Securing the Internet of Things in a connected world
- Apple defies PC downturn again, boosts Mac sales
- Zynga founder Mark Pincus gives up day-to-day duties
- FCC will seek input on latest net neutrality proposal
- Apple to Microsoft: Better late than never for Office on iPad
- In Pictures: Fave raves - 33 tech pros share their favourite IT products
- In Pictures: What the rumour mill expects from iOS 8
- In Pictures: 15 tips for surviving - and thriving - as an IT contractor
- Quip issues API for mobile word processor, aims it at enterprise IT
- In Pictures: Cool tech and hot cars from the N.Y. Int'l Auto Show
- Telstra signs broadband security deal with Mako Networks
- With OpenPower, IBM tries to turn the tables on Intel
- Report: US FCC to allow payments for speedier traffic