Data Security

Page 2 - Forum discussion tagged with Data Security.
  1. Paul Wagenseil

    Apple Pay: Can You Trust It?

    The new iPhone's Apple Pay mobile-wallet system sounds fantastic -- until you read the fine print. Apple Pay: Can You Trust It? : Read more
  2. Paul Wagenseil

    UPS Store Malware Likely Hit Many Other Companies

    The U.S. government said the credit-card-stealing Backoff malware that hit UPS Stores had infected many other companies. UPS Store Malware Likely Hit Many Other Companies : Read more
  3. Hastibe

    Does two-factor authentication prevent access when encrypted database is stolen?

    If you store your encrypted passwords on the cloud (e.g. as a file on Dropbox or on LastPass servers, etc.) does having two-factor authentication enabled (for Dropbox or your LastPast account, etc.) protect you if hackers steal your encrypted file of passwords from Dropbox or LastPast (etc.) and...
  4. G

    ASLR: What It Is and How It Protects You

    Address space layout randomization may be a mouthful, but it's also essential to protecting modern computer operating systems. Here's an explanation of what it is and how it works. ASLR: What It Is and How It Protects You : Read more
  5. G

    Protecting Your Data: Grading the Major Websites

    How well do major websites protect your data? The Electronic Frontier Foundation has rated the encryption practices of 18 sites. Protecting Your Data: Grading the Major Websites : Read more
  6. G

    How to Encrypt Your Android Phone or Tablet

    Encrypting your Android device adds a strong layer of security, and it's easy to do. Here's how. How to Encrypt Your Android Phone or Tablet : Read more
  7. G

    America Not As Paranoid As Online Privacy Survey Suggests

    America Not As Paranoid As Online Privacy Survey Suggests America Not As Paranoid As Online Privacy Survey Suggests : Read more
  8. G

    FCC Fines Telcos Over Data Security

    In April of 2007, the Federal Communications Commission (FCC) created a new rule requiring all phone companies to submit reports on its Customer Proprietary Network Information (CPNI) practices. Unfortunately, many of those required to submit the yearly FCC Fines Telcos Over Data Security ...
  9. G

    Complete Data Security A Mission Impossible, Study Claims

    Even what we perceive to be foolproof IT systems will never be able to safeguard sensitive information, according to researchers from the University of Leeds. The "human autopilot" gets the blame. Complete Data Security A Mission Impossible, Study Claims : Read more