It’s been a rough few weeks for Android, at least as far as security issues are concerned. Just a few days ago …
The right network data protection tools lower encryption costs and scale the network without adding complexity.
From phishing attacks to new and creative malware to infected laptops, cyber-crime is globally growing at an alarming rate
WhatsApp recently announced encryption for all its 1 billion users. All the messages, phone calls, photos, and videos sent over the messaging app
India allegedly has a secret technology to decrypt iPhones. Ravi Shankar Prasad, India’s communications and IT minister,
The flaws can be exploited through specially crafted images to execute malicious code on Web servers
The cloud continues to be a significant force in enterprise computing and technology adoption. Enterprises that have adopted cloud have slashed capital expenses,
Security researchers, Robert Hansen and Jeremi M. Gosney discovered a vulnerability in the way PHP handles hash comparisons.
Cyphor and Crypter can be perceived as a prelude to a new breed ad-hoc, personal crypto-solutions
As malicious cyber-attacks are increasing in occurrence, complexity and sophistication, it’s no longer about just building walls and protecting access to the data