Trend Micro is making inroads in the mobile space and expanding its data protection portfolio with the acquisition of mobile encryption company Mobile Armor. The deal, signed Monday, will give the ...
Sophos today announced a free anti-virus defense app for Google Android devices which works via the Sophos cloud-based service. Separately Sophos also made available Android and Apple iOS apps for ...
The deal, valued at approximately $586 million and subject to shareholder approval, would extend Check Point's offerings to include data encryption for enterprise mobile and removable storage devices, ...
In a few years, protection of communication with quantum encryption may become a permanent fixture in mobile phones and thus protect communication from hacking. The technology has already been ...
This is a comprehensive list of the best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit. Explore Get the web's best business ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Mobile messaging giant Line has announced that it’s introducing ...
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. BERLIN (AP) — Cybersecurity researchers in ...
U.S. President Barack Obama’s dilemma over the security of his BlackBerry has given rise to an increased interested in systems that can scramble voice calls to avoid interception. At this year’s Cebit ...
Mobile micropayments have become an essential part of our daily lives. Whether paying for a coffee, subscribing to a digital service, or making in-app purchases, small digital transactions are now ...
Hi, I have a generic 2.5" mobile USB2 hard drive. Is there any quick and easy software/utility out there that will at least let me put a password upon accessing the data? It's has to be installed with ...
Europol is proposing solutions to avoid challenges posed by privacy-enhancing technologies in Home Routing that hinder law enforcement’s ability to intercept communications during criminal ...
Data encryption as a crucial step to manage data access and security Your email has been sent In a poll of 1,000 business professionals and software developers, nearly 45% say their company has faced ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results