Data Security

Forum discussion tagged with Data Security.
  1. M

    Most Americans Still Don't Know Facebook Tracks Them

    Facebook lets advertisers see your politics, hometowns, ethnicity, marital status and more -- but most American users have no idea. Most Americans Still Don't Know Facebook Tracks Them : Read more
  2. M

    Don’t Use Facebook? Facebook Tracks You Anyway

    New report details how dozens of Android apps share user data with Facebook, even if you don't have a Facebook account. Don’t Use Facebook? Facebook Tracks You Anyway : Read more
  3. Paul Wagenseil

    Apple Hacked By 16-Year-Old Fan

    An Australian teenager hacked into Apple servers and stole 90GB of data, prosecutors told a Melbourne courtroom. Apple Hacked By 16-Year-Old Fan : Read more
  4. B

    How secure is the winzip/winrar passwords?

    How secure is the password set for extraction of the winzip / winrar files? Is it a good way to protect the privacy of files by zipping them with winzip / winrar ? How secure it is? Of course I will not assign stupid passwords like abcde or 12345 , but passwords like fsgj#AAs212fssjh
  5. G

    21 Million Exposed in Timehop Data Breach: What to Do Now

    A data breach has put 21 million users of the Timehop mobile app at risk -- but don't panic. 21 Million Exposed in Timehop Data Breach: What to Do Now : Read more
  6. G

    IDrive Personal Cloud Backup Review: Best Overall

    IDrive is best for anyone who has multiple machines to back up. Just keep an eye on the 2TB or 5TB storage limit. IDrive Personal Cloud Backup Review: Best Overall : Read more
  7. G

    Acronis True Image 2018 Cloud Backup Review: Best for Power Users

    Acronis True Image is expensive and complicated, but it offers a wide range of options and features for hard-core PC users. Acronis True Image 2018 Cloud Backup Review: Best for Power Users : Read more
  8. G

    Credit Sesame Platinum Review: You Can Do Better

    Credit Sesame's identity protection is competent and moderately priced, but the website is full of ads and human help can be hard to find. Credit Sesame Platinum Review: You Can Do Better : Read more
  9. G

    ID Watchdog Platinum (2018): The Basics, Plus Security

    ID Watchdog Platinum offers the basics of identity protection, but you'll get more features from other services. ID Watchdog Platinum (2018): The Basics, Plus Security : Read more
  10. G

    Enpass Password Manager: Just the Basics

    Enpass does password-manager basics right, and costs at most $20. Enpass Password Manager: Just the Basics : Read more
  11. Johnny5

    Common Sense Tips for Cybersecurity

    Ransomware. Phishing attacks. Malware. These days, cyberthreats are everywhere :fou: Companies big and small are taken down all the time. Even us, the authority in tech, have to keep a stiff upper lip in the face of these constant attacks. It's not uncommon to be blasted by DDOS attackers and...
  12. K

    file lost in folder lock?

    actually i installed anvi folder lock in my computer and i locked some files in E drive but unfortunately my os got corrupted and i was in a situation to change the operating system so, i wiped all the data in c drive to change the os .after changing the os i cant able to see the locked files in...
  13. Graybush

    How should the Trump Administration secure their phones? Which Android Phone has the best security?

    If the Trump Administration was going to purchase a new Android phone for every member of the White House Staff, but the budget only affords for one model, which model should they buy? As part of the new Technology Acquisitions Team, it’s up to you to make that decision. What would you do? What...
  14. J

    Send big files over the internet securely.

    Recently in my new job i had to send very important large files ? What is the safest way because this data shouldn't fall into wrong hands ?
  15. KiL3MaNjAr0W

    Challenge by my Security+ Professor

    Okay so my professor for Net+ has offered a challenge to his students that will be enrolled in his Security+ class next semester. The challenge is getting passed his network security and obtaining his windows product code if successful we will not have to attend a class or complete an assignment...
  16. BlueMustache

    Trend Micro Security Trojan Removed

    Hello Tom's Hardware, Today I mounted an ISO file, and and an autorun ran. TrendMicro called it a generic Trojan and quarantined it. I don't know exactly what went down, as I mounted it, then left the room for 5 minutes. TrendMicro said to restart to finish getting rid of the Trojan. I did so...
  17. A

    Storage shredding vs filling up the device on Win 7 and later

    As the title says, I am curious about the difference between shredding and maxing out the space of HD, flash drive, and other storage devices using Windows 7 and above. When I shred files, of course the files are hopefully unrecoverable or at least mostly. I hear that this is because the...
  18. F

    Use wordpress to build my online store

    Hello everybody I am currently thinking to create an online bog-forum using WordPress and in the future i am thinking to expand this website and include also a store. I will start building this website using WordPress because it's fast and easy. In the future that i want i will most probably...
  19. NCDad

    CBL Data Shredder Disk Wipe Tool

    I am using CBL Data Shredder disk wipe tool to erase an HDD. The tool has been running for over 48HRs. There are three different clocks at the bottom of the screen. I have no idea what those clocks are telling me. At least one of the clocks is counting downwards. There is an accumulating %...
  20. viveknayyar007

    Remotely Wipe Data from a Stolen iPhone

    Your iPhone may contain important data and the kind of information that you don’t want anyone else to access. That said, in case your phone gets stolen, you must either get it back or wipe all your sensitive info from it in order to keep the records from being misused in any manner. Here’s how...
  21. Paul Wagenseil

    Apple Pay: Can You Trust It?

    The new iPhone's Apple Pay mobile-wallet system sounds fantastic -- until you read the fine print. Apple Pay: Can You Trust It? : Read more
  22. Paul Wagenseil

    UPS Store Malware Likely Hit Many Other Companies

    The U.S. government said the credit-card-stealing Backoff malware that hit UPS Stores had infected many other companies. UPS Store Malware Likely Hit Many Other Companies : Read more
  23. Hastibe

    Does two-factor authentication prevent access when encrypted database is stolen?

    If you store your encrypted passwords on the cloud (e.g. as a file on Dropbox or on LastPass servers, etc.) does having two-factor authentication enabled (for Dropbox or your LastPast account, etc.) protect you if hackers steal your encrypted file of passwords from Dropbox or LastPast (etc.) and...
  24. G

    ASLR: What It Is and How It Protects You

    Address space layout randomization may be a mouthful, but it's also essential to protecting modern computer operating systems. Here's an explanation of what it is and how it works. ASLR: What It Is and How It Protects You : Read more
  25. G

    Protecting Your Data: Grading the Major Websites

    How well do major websites protect your data? The Electronic Frontier Foundation has rated the encryption practices of 18 sites. Protecting Your Data: Grading the Major Websites : Read more
  26. G

    How to Encrypt Your Android Phone or Tablet

    Encrypting your Android device adds a strong layer of security, and it's easy to do. Here's how. How to Encrypt Your Android Phone or Tablet : Read more
  27. G

    America Not As Paranoid As Online Privacy Survey Suggests

    America Not As Paranoid As Online Privacy Survey Suggests America Not As Paranoid As Online Privacy Survey Suggests : Read more
  28. G

    FCC Fines Telcos Over Data Security

    In April of 2007, the Federal Communications Commission (FCC) created a new rule requiring all phone companies to submit reports on its Customer Proprietary Network Information (CPNI) practices. Unfortunately, many of those required to submit the yearly FCC Fines Telcos Over Data Security ...
  29. G

    Complete Data Security A Mission Impossible, Study Claims

    Even what we perceive to be foolproof IT systems will never be able to safeguard sensitive information, according to researchers from the University of Leeds. The "human autopilot" gets the blame. Complete Data Security A Mission Impossible, Study Claims : Read more