Police are concerned about public snooping of police radios by using smartphones, and some are moving their communication to fully encrypted channels.
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic.
Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.
Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.
Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.
Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.
BEAST is an exploit developed by security researchers to break the TLS 1.0 encryption used by most major browsers and websites. Here’s how it works, and how you can protect yourself.
Here's what GlobalSign's move means, and how to evaluate a certificate authority for your business website.