This area is a convenient resource for expert advice on a variety of security issues that people face everyday at home or work. A team of technology writers offer well-researched articles and tips to help consumers find the best computer security software, know how to setup and secure computers, and which methods are the best way to keep your computer protected.
Google has set its sights on killing the user password… at least on Android devices. Big news from the Google I/O event as Google has unveiled the Trust API, which allows developers to use sensor and biometric data for authentication.
As technology evolves, so does the malware that hacks and exploits it. Many threats, like viruses, worms and Trojans found on PCs, are at this point well known – but there are new threats on the horizon that can be equally dangerous.
Nobody likes to think about the possibility of losing their laptop. It becomes such a personal possession that the theft is more than a crime--it's a personal insult--if somebody steals it. But you've got to be prepared for the unthinkable, and...
You've probably heard the term "0-day" before in discussions on PC security, but it's not always apparent what the term means. Here, we're going to take a look at what these threats are, how they're different from other malware...
Learn what can be done to protect your privacy and security when it comes time to retire that old computer. Do you know how to properly wipe a hard drive? What about donation options for your old computer? We'll give you several options here...
Is your computer secure? Many users have viruses on their computers and don’t even know it. Others think they are sufficiently covered in case of any malicious attack. This quiz will help you figure out if you are as secure as you think you...
Ever wonder how computer security techs can easily determine the problem of a PC? You can be like them by reading this guide. Find out about the worst exploits and issues plaguing your systems, and some of the easy ways to fix them.
If you regularly use a computer, you doubtlessly have different accounts online, most requiring a password. But unless you have researched password safety, you are probably vulnerable like many others.
Mail proxies are used mostly to control Spam - to stop unwanted e-mail from being delivered to your employees. But how do they work? More importantly, is your small business taking advantage of the technology?
Different types of smart cards are used by individuals and businesses as tool for identification, authentication and data protection. Find out what they are all about and how they work. Popular functions, design and applications are discussed.
By Sheila Robinson
August 25, 2011
showing 1-10 of 203< Previous | page: 12345 ... | Next >