Don't-Miss Encryption Stories
The SpiderOak secure online backup service protects you by encrypting your data with keys that only you know.
Security researchers released two tools at the Defcon security conference that can beat the encryption of certain PPTP sessions in less than a day's work.
The passwords used by the eHarmony site visitors shows that names of sports teams, dogs, states and masculine and feminine names formed the foundation of many of the passwords.
Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive
Encryption is a crucial part of computer and data security, but don't ever make the mistake of believing any encryption is "unbreakable".
A new startup's free app anonymizes and encrypts your connection, and scans for malware, while you browse.
Secret wartime projects drove "incredible" advances, and the German Enigma cypher machine is still a challenge for codebreakers.
Microsoft issued a security advisory after discovering that the 'Flame' malware attack exploits a flaw to appear as if it's legitimate code from Microsoft.
An astonishing 20KB in size, Tinba retains enough sophistication to match almost anything that can be done by much larger malware types.
Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
Intel's new Ivy Bridge processors are faster and more efficient than previous CPUs, and--thanks to 'Bull Mountain'--they're also more secure.
With its 'friend-to-friend' approach, this free and open source service offers a secure way to chat and share files with only the people you trust.
Enlocked is a free service that takes the confusion out of email encryption.
The migration to the cloud has introduced a new set of complex security issues for IT teams to manage due to the lack of direct control over the security of the data.