Legal professionals have a particular interest in keeping information secure. We explain what you can do to ensure client data remains locked up tight.
Digital signatures can be used to verify the identity of another party, check the integrity of data and provide non-repudiation. Find out how they work in our comprehensive guide.
UK readers, beware of this scam targeting BT Internet customers over the phone that cost one woman £34,000. Tech support scams like these often target the elderly and vulnerable, so be sure to warn your parents and grandparents.
Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
Ransomware is a particularly invasive form of malware that typically takes over a victim’s data or device and holds it hostage until a sum of money is handed over to secure its release.
The Diffie-Hellman key exchange was one of the most important developments in public-key cryptography. Find out why it's still such an important aspect of internet security.
68 percent of secondhand USB flash drives sold in the US, and 67 percent sold in the UK, still contain recoverable data from their previous owners, according to a new study by the University of Hertfordshire and commissioned by Comparitech.
Social engineering is a tactic used by cybercriminals to manipulate people into divulging information, often with the ultimate goal of financial gain. Find out more about what social engineering is and why it works, as well as what you can do to avoid it.