Data and Information Security | News, how-tos, features, reviews, and videos
Explore related topics
Yet another breach shows that good security practices applied to the public cloud are the best data defense
Keys hard-coded in thousands of routers, modems, IP cameras, VoIP phones and other devices can be used to launch man-in-the-middle attacks
As Internet growth approaches hyperspeed, security will get worse before it gets better
Dell pre-installing eDellRoot on Windows machines shows that even the world's largest PC maker doesn't understand how certificates and keys function
The Dell System Detect application also installs a self-signed root certificate on computers
The full scope of the incident is still unclear -- and it's not just laptops -- but there's a removal tool available
Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop and evidence another problematic one is circulating
We cannot let the world think that encryption can be compromised or tossed aside
IBM incorporated Identity Mixer, a cryptographic tool designed to handle authentication for third-party applications, into Bluemix
The suspected mastermind of last week's terror attacks in Paris, Abdelhamid Abaaoud was tracked with the aide of an abandoned phone