A proposal from two senior U.S. senators would force tech companies to give technical assistance to law enforcement agencies trying to break into encrypted devices.
The inventors of public key cryptography have won the 2015 Turing Award, just as a contentious debate kicks off in Washington over how much protection encryption should really offer.
Apple has several avenues for appealing a magistrate judge's order that it help the FBI unlock an iPhone owned by terrorist shooter.
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
U.S. Secretary of Defense Ash Carter will renew his appeal to businesses to work more closely with the military on Thursday when he speaks to an audience of top executives at the Sun Valley conference in Idaho.
It's no secret that security has been a tripping point for enterprises considering cloud storage, but OwnCloud on Tuesday took a fresh step toward alleviating such concerns with the addition of a new encryption framework.
Server admins and developers beware: The OpenSSL Project plans to release security updates Thursday for its widely used cryptographic library that will fix a high severity vulnerability.
U.S. Federal Bureau of Investigation Director James Comey has asked for a "robust debate" on encryption of communications, saying that the technology could come in the way of his doing his job to keep people safe.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Potentially saving the world from another online security disaster like last year's Heartbleed, Amazon Web Services has released as open source a cryptographic module for securing sensitive data passing over the Internet.
Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications.
Cisco Systems said on Thursday it released a patch for three products that shipped with default encryption keys, posing a risk that an attacker with the keys could decrypt data traffic.
Most Popular Reviews
- 1 Fetch TV Mighty review: Better than Foxtel
- 2 Fetch TV Mini review: Make your TV a smart TV
- 3 Parrot Mambo Drone review
- 4 Evapolar USB air conditioner review
- 5 Hisense Series 7 ULED 4K UHD TV review
Join the Good Gear Guide newsletter!
Latest News Articles
- Tesla cars to have full self-driving gear, but feature disabled for now
- We compared the speakers of a Pixel XL and an iPhone 7
- Apple to announce new Macs at a special event October 27
- This disinfection robot can light the way to cleaner hospitals
- Apple's MacBook Pro 15 is basically a fossil at this point and here's the proof
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTHands-on Service Desk Team LeadNSW
- CCADABAS Database Administrator - NV1 clearedACT
- CCHead of Digital (Technology Manager - Digital Transformations)NSW
- FTTechnical Support Engineer | Cloud | Automation techsNSW
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- FTOutbound TelesalesVIC
- CCDigital Solutions ManagerNSW
- CCE-Commerce - Senior Web DeveloperNSW
- FTSystems Engineer - Managed Service Provider - No two days are the sameNSW
- CCeCommerce Project ManagerNSW
- FTData Governance Project Manager | 6 month ContractNSW
- FTSenior Architect | Perl | Linux |MySQL | Infrastructure | TelecomNSW
- CCChange Manager - Telco projectsNSW
- CCAcquisition Marketing Executive - B2BNSW
- FTLinux Systems AdministratorNZ
- FTOutbound TelesalesVIC
- CCBusiness Analyst - Telecom ProjectNSW