Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Within one day of the disclosure of the flaw known as Heartbleed, an attacker posing as an authorized user broke into a corporate computer system, exploiting the vulnerability in the OpenSSL protocol, the breach detection firm Mandiant says.
Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
Encryption is the method of encoding information using a password, in order to hide the real information from others. The technique is used for various tasks, including secure storage and transferring data between computers and wireless networks.
Storing information on computers is an everyday occurrence for most computer users, both at home and work. Solid state drives, external hard drives, online storage and file servers are some of the common devices used for storing valuable information. Read about each of these below for the common uses of each one.