Data Backup Digest

Do-It-Yourself Windows File Recovery Software: A Comparison

results »

Data Protection

Sort by: publishing date popularity

How Do Cryptographic Hash Functions Work?

Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.

10 / 30 / 2018 J.R. Johnivan

Pentagon Accepting Proposals for $639MM Data Storage Contract

A follow-up to the ESS II contract awarded in 2014, the ESS III promises to tread even more ground in data security and protection.

09 / 04 / 2018 J.R. Johnivan

How Unwanted Apps May Be Spying On You

Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.

09 / 04 / 2018 J.R. Johnivan

Service Provider Telstra Moves to Block Malicious Traffic

Australia's largest mobile communications provider is seeking governmental approval to help fight malicious web traffic.

08 / 30 / 2018 J.R. Johnivan

Are Gmail's App Developers Reading Your Emails?

Are third-party app developers reading your personal inbox messages? Short answer: yes.

07 / 28 / 2018 J.R. Johnivan

How to Protect Your Android Phone After Gaining Root Access

Rooting your Android phone can be a stressful and scary endeavor - but it can result in a more secure device in the end.

07 / 03 / 2018 J.R. Johnivan

The Better Business Bureau Offers Tips to Safeguard Your Online Data

The Better Business Bureau recently published a list of top tips you can do to help safeguard your online data.

05 / 04 / 2018 J.R. Johnivan

1 2 3 4 ... 9
Total 9 pages