Historically, the push for IT changes came from top-level executives and organizations provided employees with high-end computers that were well beyond the tech...
TORONTO - For the last 35 years, Star Wars has been the cornerstone of mainstream and geek cultural awareness. While Star Wars is a piece of dramatic fiction, many have found inspiration and solace ...
Full disk encryption - also known as whole encryption - is the most effective way to prevent confidential data being taken from a laptop that has been lost, stolen or left ...
It's an unstoppable trend: Employees are bringing their own iPhones, iPads, and Android devices to work and using them for business purposes. While that may be great for pr...
What would happen if you lost your wallet to a thief? It's a question that Google Wallet users on Android phones are asking themselves in the wake of multiple reports of sec...
Just when you thought the evidence was dramatic -- overwhelming perhaps -- that Apple's iOS offers vastly more mobile security than does Google's Android, the wall of confid...
Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control of i...
Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even more daun...
Security shouldn't stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal an...
The flaws that make WEP vulnerable were documented back in 2001, prompting development of dozens of cracking tools. Until recently, those attacks focused on traffic captured from active networks...