Data encryption

Data encryption News

Kickstarter suspends Anonabox Tor router project

After days of critical scrutiny on social media networks, the wireless router that was supposedly a custom-built Tor privacy engine has been suspended by Kickstarter after raising nearly $600,000 in only a few days. read more »

Once the FBI has a backdoor into your smartphone, everyone does

FBI director James Comey believes tech companies should be forced to insert back doors to bypass encryption on smartphones. But experts say once that happen,s security is moot and anyone can breach your privacy. read more »

Apple Pay hits U.S. stores Monday -- assuming buyers can find anywhere to use it

read more »

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said read more »

FBI director calls for greater police access to communications

Apple and Google should also rethink their plans to enable smartphone encryption by default, he says read more »

All-in-one printers can be used to control infected air-gapped systems from far away

Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner read more »

more news ..
Data encryption Blogs

An online kit for digital emergencies

A new EFF resource helps non-technical people deal with malware, intrusions and losses. read more »

Here's What's Missing from the 'Technology Manifesto'

read more »

The eBay security breach - more lessons to learn

The consequences of the eBay breach may not be known for some time read more »

The eBay breach: Big brands can no longer protect their users

If the attack happened in February or March, it’s long past the point where a reset will stop possible secondary compromises read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data encryption In Depth

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »

How an SME overcame technical hurdles to work with government

How an SME is working to gain IL3 certification to enable it to make its mark in the government supplier pool read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

The making of a cybercrime market

Business analysis and online crime read more »

more in depth ..
Data encryption Slideshows

Open source and free software graveyard, 2014

We've tossed in a couple of freeware offerings that are no more as well read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open