Similar Articles |
|
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
InternetNews November 18, 2009 |
Wi-Fi Breaches Found in iPhone, Android Devices Mobile security firm successfully hacks several smartphones in warning to industry. |
Popular Mechanics April 2009 Seth Porges |
How to Make Your Webmail Secure Web-mail users need to be especially careful when it comes to their cyber security. Here's how. |
InternetNews April 8, 2008 Andy Patrizio |
Microsoft Issues Critical Fixes to Windows, Apps Microsoft issues eight alerts cover a variety of OS, Internet and application vulnerabilities. |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... |
InternetNews August 9, 2005 Jim Wagner |
Microsoft Patches 3 Critical Flaws Microsoft Windows issues three critical and three moderate-to-important fixes in its August installment of security fixes. |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
InternetNews June 6, 2009 Alex Goldman |
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |