Your Search returned 32 results from our Editorial content

Sort By

SECURITY

The security industry found its dream enemy in 2013 -- and...

2013 was the year we learned we must encrypt our data if we don't want the likes of the U.S. National Security Agency or the U.K. Government Communications Headquarters...

SECURITY

BitTorrent develops secure, decentralized chat program using...

BitTorrent, the company behind the popular file sharing protocol with the same name, is developing a secure chat application that will encrypt all communications...

   

DATA PRIVACY AND SECURITY

Bogus antivirus program uses a dozen stolen signing certificates...

A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the...

SECURITY

Lavabit to reopen for 5 days to let users download lost...

Secure email provider Lavabit is coming back from the dead for a brief time to give users a chance to recover their data, after abruptly shutting its doors in August...

   

ENCRYPTION

Lockdown: How to secure your PC without going crazy

Good digital security inevitably requires some hassle, but the size of that headache is really up to you. If you're someone who wants to go all out with 64-character...

ENCRYPTION

NSA-resistant Android application 'burns' sensitive messages...

Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases...

   

ENCRYPTION

IDriveSync secures cloud storage

Cloud storage and security are two concepts that many people think are exclusive. But that's not the case with IDriveSync, a cloud storage tool that puts the user...

ACCESS CONTROL

Researchers reveal methods behind car hack at Defcon

Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other...

   

ACCESS CONTROL

Researchers reveal methods behind car hack at Defcon

Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other...

SECURITY

Bitdefender Safepay offers secure browsing for online banking,...

Bitdefender has released a Windows application designed to help users secure sensitive Web-browsing sessions, especially when they shop or bank online. The application...

   
   
1 3

Your Search returned 0 results from our White Paper Library

Sort By
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?