So long, TrueCrypt: 5 alternative encryption tools that can lock down your data
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan […]
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan […]
Now that blazing-fast routers based on the IEEE 802.11ac standard are finally entering the mainstream, intrepid engineers are busily cooking
Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.
It started with a text message from my wife: “ZATZ site hijacked by nasty porn.” This is not exactly the
Hosts: Fr. Robert Ballecer, SJ, Harry McCracken, and Steve Kovach The EU’s “Right To Be Forgotten,” Apple may not call
The team behind Linux Mint unveiled its latest update this week—Mint 17 using kernel 3.13.0-24, nicknamed “Qiana.” The new release
Based on some recent experience, I’m of the opinion that smartphones are about as private as a gas station bathroom.
Ten days after launch, Microsoft is still trying to squash the bugs in its Surface Pro 3 tablet. As
San Francisco and San Jose are now at the cutting edge of another tech trend, and one that has nothing
AMD and Nvidia are at it again. The two reigning champs in the market for video game graphics have been