On average, it takes businesses 287 days to find and contain a data breach, giving attackers over nine months to access and steal any records they want from the database. However, encrypting those ...
FileLock, a utility that allows you to lock files, has been updated fixing several bugs in the application. FileLock uses 448-bit Blowfish encryption and is optimized to take advantage of multiple ...
File and folder security is crucial in this day and age. There are apps you can use to heighten the security of your files. These apps are free and available for desktop and mobile devices. The need ...
Maybe there was a time when you wanted to lock away certain pages in a PDF, but you didn’t have the tools to get it done. Well, those days are over due to the release of an interesting software known ...
Encryption options like PGP are great, but the labyrinth of keys and passwords that look like a master’s thesis written in gibberish can be overwhelming. For simple exchanges, there’s now an easier ...
The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it’s a Chrome app that aims to make it easy to create and share single encrypted files with others ...
The developers of a type of malicious software that encrypts a computer’s files and demands a ransom have fixed an error security experts said allowed files to be ...
Multiple weaknesses exist in AppLock, a popular lock application for Android devices that boasts over 100 million users. Multiple weaknesses exist in AppLock, a popular lock application for Android ...
A new ransomware group called Memento takes the unusual approach of locking files inside password-protected archives after their encryption method kept being detected by security software. Last month, ...
A new form of ransomware that has been spotted in the wild uses what researchers call "overkill" levels of encryption to hijack infected systems. This week, FortiGuard Labs said the new variant, known ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results