Topics
Content Types
About 49 results
-
Changes to Google Chrome and Chrome OS certificate handling
Beefed up requirements for RSA keys and changes to the way Google Chrome handles certificates will benefit Internet security for end users.
-
How facial recognition software can track you in the offline world
Patrick Lambert looks at the increased use of facial recognition software.
-
Researchers create nearly undetectable hardware backdoor
University of Massachusetts researchers have found a way to make hardware backdoors virtually undetectable.
-
What can IT do in the fight against government surveillance tactics?
Will the fight for privacy and freedom from government surveillance reach the grassroots of IT departments?
-
Are we heading for a 'cryptopocalypse'?
Patrick Lambert considers the current state of cryptography. Is it doomed to become obsolete as technology advances?
-
Resources for aspiring IT security pros
Are you contemplating in career in IT security? There are some basic resources to help you decide if it's right for you.
-
Freedom Hosting and 'torsploit': Troubles on the Onion router
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
-
Worst IT fail ever? US agency spends millions in useless security
A branch of the U.S. Commerce Department recently trashed perfectly good computers and wasted millions on a bogus malware infection. How did this happen?
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.