The increasing amount of data we’re all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access? We ...
A team of researchers discovers that a big chunk of geostationary satellite data flowing over North America is unencrypted, ...
Curious about the security of your documents in the cloud? You’re not alone. We recently received an email from Dana in Marietta, Ga., who is asking this, "I just read your article on saving documents ...
Federated learning is a machine learning technique that allows several individuals, dubbed "clients," to collaboratively ...
End-to-end encryption secures messages before they're sent and decrypts them only after arriving at a recipient's device.
As more companies disclose information losses and data theft, information technology companies have entered the market to sell products that encrypt entire hard drives. Those companies argue that ...
On Wednesday, Apple announced its new Advanced Data Protection feature, which will allow users to easily and securely encrypt more data stored on their iCloud servers. This feature will prevent Apple ...
Certificate authority Let's Encrypt has admitted to accidentally disclosing thousands of user emails. Over the weekend, Josh Aas, executive director for the Internet Security Research Group (ISRG) ...
The dataShur SD can use iStorage microSD cards to store data encrypted to the highest standard and only accessible through a PIN. Corporations spend a vast amount of money tracking and securing their ...