Data Protection
Sort by: publishing date popularity
Video Game Dungeon Defenders 2 Embraces Blockchain
We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?
10 / 31 / 2018 J.R. Johnivan
How Do Cryptographic Hash Functions Work?
Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.
10 / 30 / 2018 J.R. Johnivan
Pentagon Accepting Proposals for $639MM Data Storage Contract
A follow-up to the ESS II contract awarded in 2014, the ESS III promises to tread even more ground in data security and protection.
09 / 04 / 2018 J.R. Johnivan
How Unwanted Apps May Be Spying On You
Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.
09 / 04 / 2018 J.R. Johnivan
Service Provider Telstra Moves to Block Malicious Traffic
Australia's largest mobile communications provider is seeking governmental approval to help fight malicious web traffic.
08 / 30 / 2018 J.R. Johnivan
Are Gmail's App Developers Reading Your Emails?
Are third-party app developers reading your personal inbox messages? Short answer: yes.
07 / 28 / 2018 J.R. Johnivan
How to Protect Your Android Phone After Gaining Root Access
Rooting your Android phone can be a stressful and scary endeavor - but it can result in a more secure device in the end.
07 / 03 / 2018 J.R. Johnivan