Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic.
Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.
Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.
Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.
Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.
BEAST is an exploit developed by security researchers to break the TLS 1.0 encryption used by most major browsers and websites. Here’s how it works, and how you can protect yourself.
Here's what GlobalSign's move means, and how to evaluate a certificate authority for your business website.
Melissa has her doubts about backing up online. Could her data be stolen?