Legal professionals need to worry about cybersecurity for their own data as well as that of their clients. We discuss the best practices that can help.
Digital signatures can be used to verify the identity of another party, check the integrity of data and provide non-repudiation. Find out how they work in our comprehensive guide.
SSH is a security protocol used for remote login, tunneling and much more. Find out how it works, what it does and whether it is secure.
UK readers, beware of this scam targeting BT Internet customers over the phone that cost one woman £34,000. Tech support scams like these often target the elderly and vulnerable, so be sure to warn your parents and grandparents.
Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
Ransomware continues to be a growing threat. We explain what it is and discuss methods for ransomware removal and prevention.
The Diffie-Hellman key exchange was one of the most important developments in public-key cryptography. Find out why it’s still such an important aspect of internet security.
Most secondhand USB drives sold in the US and UK still contain personal data from previous owners, according to a new study.
It’s not only machines that can be hacked – criminals can use social engineering to “hack humans” too. Find out more about this tactic and how to avoid it.
Facial recognition is now mainstream. There’s a new battle is between privacy and surveillance, and it’s moving fast. Who will come out the winner?