G_laptop_security The case involving a major health care organization involved a laptop stolen from an employee's home and 2 lost USB devices. An administrative judge ruled in June that the University ...
The National Security Agency has granted Type 1 security certification for a software upgrade to Harris Corp.'s SecNet 54 secure local-area network encryption device. A Type 1 device is one that has ...
If you left your smartphone behind in a coffee shop or you were required to pack your tablet in your checked luggage, would your personal data be safely locked away? If you don't have your device ...
As the typical company's data continues to grow 50 percent annually and the average cost of a breach of that data reaches $4.8 million, the market is ready for centralized encryption of the data, said ...
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
With more defense organizations thinking about using iPhones, BlackBerrys, Droids and other commercial handheld devices for field activities, there’s growing interest in whether such devices can be ...
After attaching an embedded device to a network, you'll find that it requires a network adapter and a protocol stack. Connect that same device to the Internet, and it ...
Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names ...
Phone encryption is currently a hot topic in the mobile world, therefore it was only a matter of time until the FBI commented on such technology. The agency did just that in a speech at the Brookings ...
Microsoft is aware of this issue where BitLocker might incorrectly receive a 65000 error in MDMs, and they are expected to release a fix shortly. Affected ...