Information is gold and cyber villains are getting more aggressive in their attempts to steal it. Data theft requires new ways of thinking, says Symantec CEO Enrique Salem at RSA.
<b>eSecurity Planet:</b> "Some might think WPA encryption is cracked, while others say it's secure. Here we look at each myth and tell you whether it's verified--or busted."
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Social networking giant rolls out a login notification service alerting users to activity on their accounts and begins asking verification questions when users log in from unfamiliar devices.
One simple step you can take to protect your data or small business network is to prevent employees from using USB Flash drives and CD/DVD drives on company PCs. We'll show you how.
One simple step you can take to protect your data or small business network is to prevent employees from using USB Flash drives and CD/DVD drives on company PCs. We'll show you how.
One simple step you can take to protect your data or small business network is to prevent employees from using USB Flash drives and CD/DVD drives on company PCs. We'll show you how.
With only three "critical" vulnerabilities to patch in June, you'd think that it was going to be an easy week for system administrators -- but you'd be wrong.
The report from open source vendor Mozilla includes plenty of insights into where Firefox is used. Guess where Firefox has an 80 percent share of the browser market?
<b>Datamation:</b> ""We found that the typical user has between 2 and 3 tabs open at any one time," Mozilla stated. "And what was the maximum? Over 600 tabs!""
Looking to protect your e-mail from hackers, especially when you're on the road? For starters, don't use Yahoo. Here are some guidelines to keep your communication secure.