Tag: security

Ask a question

Join Now or Sign In to ask a question.
rcook12
1 day ago

What is SED encryption? I saw it in a hard drive description, but I’ve never heard of it before.

2 Answers |
SilverHawk
1 day ago

We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...

MrsMith
1 week ago

My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...

catamount
1 week ago

I used to use FreeFileSync a few years ago and liked it, so I recently installed it on a Windows laptop. Unfortunately, they decided to add conduit malware...

3 Answers |
ernard
1 week ago

The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...

Tags: google, HTTPS, SEO |
4 Answers |
mandril
1 week ago

I heard BGP hijacks referred to as a method of mining bitcoins. What is a BJP highjack?

dblacharski
2 weeks ago

Yes, it's true that everyone should know better, and should be backing up data to an off-site facility on a regular basis. But, in...

11 Answers |
tover
2 weeks ago

I've been in IT for awhile, and am considering a shift to focus more on security and related technologies, policies, etc. What kinds of...

Tags: infosec |
3 Answers |
jack12
2 weeks ago

Maybe I have my tinfoil hat on too tight, but I don’t like the idea of anyone being able to “listen” in on my private conversations. On the other hand, in...

2 Answers |
aiden
3 weeks ago

The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...

While there have been infrastructure investments in Africa over the last eight years, most Internet content accessed in local markets is still hosted abroad -- a topic that is being addressed this week at a meeting in Dakar, Senegal.
Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.
HTC announces the Desire 510 Android phone, but doesn't mention its 64-bit processor. Plus: Samsung previews the Galaxy Note 4, and which product announcements are you looking forward to the most next month?
Samsung has started producing 64GB DRAM modules for servers based on emerging DDR4 (double-data rate 4) memory using 3D "through silicon via" (TSV) package technology.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Responding to the growth of enterprise software development teams, Microsoft will allow occasional contributors to access the Visual Studio Online project development environment at no cost.
Microsoft may be engaging in digital imperialism to protect Windows around the world. Plus: John Dvorak smacks the Linux beehive for page views, and don't forget developer stability when choosing a Linux distribution.
Todd Stabenow was on a secret mission.
HTC is hoping to make inroads in the low-end smartphone market with the 4G Desire 510, which has a new 64-bit capable Qualcomm processor. But HTC isn't sure buyers will be able to take full advantage of that capability.
An issue with Time Warner Cable's Internet backbone disrupted the company's Internet and on demand services on Wednesday morning, the company said.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness