Don't-Miss Encryption Stories
Digital privacy is within your grasp with this practical beginner's guide to encryption.
IDriveSync is an easy-to-use cloud storage and syncing solution that offers added security missing from some of its rivals. It offers both AES 256-bit and private key encryption, which will appeal to anyone who's weary of weak cloud-based security.
Porcupins asked the Antivirus & Security Software forum if encryption standards like AES really make your data secure.
U.S. lawmakers pledged to rewrite an antihacking law as hundreds of people gathered in Washington, D.C., to mourn the death of Internet activist and innovator Aaron Swartz.
Have notebook, will travel? Here's how to protect your valuable notebook against prying eyes, snatching hands, and malicious Wi-Fi connections.
By enforcing HTTP Strict Transport Security (HSTS) for select domains, the beta version of Firefox 17 aims to enhance users' privacy and security online.
Microsoft BitLocker Administration and Management (MBAM) 2.0 improves on its predecessor to make it simpler to encrypt and protect data.
Encrypt entire drives with DiskCryptor, which runs as a service and is configured via a dialog. It also works in Windows 8 desktop mode.
BoxCryptor is a freemium, easy-to-use encryption program that can help you keep your data private in the cloud.
KenWid10 asked the Antivirus & Security Software forum how best to send encrypted information to someone over the Internet
Next week's Patch Tuesday is exceptionally light, but IT admins may still be busy getting ready for new cryptographic key requirements being driven by Microsoft.
After discovering how easy it is to recover data from a hard drive removed from one PC and attached to another, Melker asked the Hard Drives, NAS Drives, Storage forum if password protecting Windows actually protects your data.
Security companies, including Moscow-based Kaspersky Lab and U.S. antivirus vendor Symantec, have not yet figured out what kind of data Shamoon is looking for, then stealing.
New draft encryption guidelines from the NIST call for support for more secure extended validation certificates.
For Wi-Fi networks that are properly using 802.1X authentication, and that have transport layer security properly implemented, the impact of this exploit is essentially zero, experts say.