• Two reasonably cheap ways to get to your data when you're on the road

    Posted May 9, 2011 - 11:56 am

    Whether by phone or easy-as-pie USB-key based VPN getting to data you don't have with you can be a lifesaver. Now all you have to do is make sure the data you have are worth accessing.
  • LastPass shows how to handle potential data breach

    Posted May 5, 2011 - 12:26 pm

    Unlike other companies that have suffered major data breaches lately, LastPass pulled a server offline at the first hint of trouble and gave customers a detail of its recovery plan.
  • Cyber-spy agency NSA offers tips on keeping yourself safe online

    Posted May 3, 2011 - 3:06 pm

    Among the tips tech pubs don't usually offer consumers is to use alternative DNS providers (instructions provided), and encrypt everything, including your laptop hard drive.
  • New password method encrypts like no other

    Posted April 27, 2011 - 9:46 am

    Have you had an account hacked, or had your personal information stolen? Do you have data that needs to be protected? Fear no more. Researchers from the Max-Planck-Institut f?
  • Toshiba releases self-wiping drives

    Posted April 13, 2011 - 3:05 pm

    In an effort to keep sensitive data from prying eye, Toshiba today announced a new family of hard disk drives for a number of devices, including PCs and printers, that automatically wipe themselves of data when connected to unauthorized hosts.
  • Google boosts Android security with encrypted tablets

    Posted April 7, 2011 - 3:40 pm

    Google is trying to make Android more appealing to businesses by adding IT administration tools to Google Apps that can encrypt Android tablets or remotely locate a lost Android phone and reset the PIN.
  • Verizon admits it was among Epsilon customers in data breach

    Posted April 6, 2011 - 2:49 pm

    Verizon admitted in emails directly to customers that its data was among that stolen from email service company Epsilon, presumably widening the pool of potential victims.
  • Failure to encrypt portable devices inexcusable, say analysts

    Posted March 31, 2011 - 9:19 pm

    The continuing failure by most enterprises to encrypt sensitive data stored on laptops and other mobile devices is inexcusable, analysts said following BP's disclosure this week of a data compromise involving a lost laptop.
  • Microsoft denies intentionally shutting off Hotmail encryption in Arab countries

    Posted March 28, 2011 - 12:07 pm

    Microsoft says it did not "intentionally limit" access to Hotmail's HTTPS encryption service in foreign countries where freedom of expression is under attack.
  • Facebook exec makes security promises, drowns in irony

    Posted March 23, 2011 - 2:10 pm

    The same day a Facebook exec promised EU subscribers better privacy controls, China misappropriated all the traffic from some customers.
  • Error sends Facebook traffic through China

    Posted March 23, 2011 - 1:20 pm

    Due to what might have been a routing glitch yesterday, friends posting to your Facebook wall might have written on the Great Wall instead.
  • What do you use to keep your WiFi secure?

    Posted March 22, 2011 - 1:37 pm

    Corporate WiFi security choices depend on a lot of compromises a savvy geek doesn't have to accept for personal use. So what do you use? VPNs? Proxies? Paid? Free? Other?
  • The clock is ticking for encryption

    Posted March 21, 2011 - 11:32 am

    In the indictment that led to the expulsion of 10 Russian spies from the U.S. last summer, the FBI said that it had gained access to their encrypted communications after surreptitiously entering one of the spies' homes, where agents found a piece of paper with a 27-character password.
  • 4 virtualization security basics to watch

    Posted March 9, 2011 - 10:30 pm

    While mobile and smartphone security is the hot topic of the moment among virtualization security gurus, plenty of other virtualization security topics demand IT's attention right now. At the recent RSA Security Conference in San Francisco, the interest in virtualization security ran high - with good reason. Different IT departments are at different points on their virtualization journeys, of course, and some are still thinking about security in the old physical world terms, analysts say.
  • Review

    Review: Open source FreeOTFE encrypts disks handily

    Posted March 8, 2011 - 4:02 pm

    FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk. The data on your disk (either the whole disk or a portion of it, as you see fit) is stored in an encrypted form, and FreeOTFE handles all read and write requests, so that the operating system, applications, etc, operate normally. Despite what you might expect, speed impact is generally minimal and will probably not be noticed by a user under most circumstances.
  • Yachting hacker builds free encryption for Egyptian smartphones

    Posted February 14, 2011 - 5:58 pm

    A hacker whose day job is delivering yachts tweaked VoIP and text encryption apps to work specifically with Egyptian carriers.
  • iPads storm the enterprise

    Posted February 14, 2011 - 12:40 pm

    As global accounts director at Altus, Inc., Michelle Klatt's job is to visit Fortune 500 companies and demonstrate her firm's video management software. When the iPad came out a year ago, she was all over it.
  • Five iPad safety tips

    Posted February 14, 2011 - 12:38 pm

    Don't deploy iPads in the enterprise without considering these security measures.
  • Study: End users still the biggest hole in IT security

    Posted February 11, 2011 - 4:15 pm

    Study shows end users repeat the same password for multiple sites, making things easier for both them and hackers at the same time.
  • Can 'encrypted blobs' help with secure cloud computing?

    Posted February 4, 2011 - 6:33 pm

    Can cloud-based computing be made more secure in the future using what crypto geeks call "fully homomorphic encryption" to send data as "encrypted blobs" that can be understood and subject to processing without having to actually de-crypt them first to see the plaintext?
  • Military-grade security for your iPhone

    Posted January 26, 2011 - 1:30 pm

    A $4.99/month app for iPhones is one of a series of new products designed to make voice and data calls over cell nets secure.
  • Simple, cheap apps keep your secrets online

    Posted January 13, 2011 - 6:58 pm

    There are too many hacks and too many nuclear cookies to risk wireless browsing unprotected; easy, cheap VPNs are one good answer.
  • Self-encrypted drives set to become standard fare

    Posted January 6, 2011 - 12:36 pm

    We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive.
  • 31 "How To" resources you might have missed

    Posted December 8, 2010 - 9:49 am

    Here’s a handy roundup of some of the most useful, featuring pieces on everything from Android smartphones to Windows 7 to full disk encryption.
  • Toshiba laptop drive embraces new security features

    Posted December 2, 2010 - 12:11 pm

    Toshiba has become the latest storage vendor to build Opal Security Subsystem Class (Opal SSC) specification into its self-encrypting drive (SED) for PCs and laptops, the MKxx61GSYD.
Join us:






Join today!

See more content
Ask a Question