
The Nine Most Secure and Private Internet and Mobile Messaging Services
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
687 articles
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
There’s been much hoopla in recent weeks over claims from Apple and Google that user content stored in the latest iterations of the iOS and Android operating systems is encrypted
It’s 2014, Lockheed Martin recently announced that it is making real progress toward developing a compact nuclear fusion reactor capable of providing unimaginably vast supplies of energy in exchange for
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
A number of popular Android applications are putting sensitive user data at risk of exposure because the app developers are not fully implementing encryption.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
We have bought our very own Blackphone to check its security firsthand.