Data Backup Digest

Do-It-Yourself Windows File Recovery Software: A Comparison

results »

Data Protection

Sort by: publishing date popularity

How Do Cryptographic Hash Functions Work?

Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.

10 / 30 / 2018 J.R. Johnivan

Video Game Dungeon Defenders 2 Embraces Blockchain

We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?

10 / 31 / 2018 J.R. Johnivan

Are Your Backups GDPR Compliant?

The General Data Protection Regulations should not be ignored -- find out how to ensure that your backups are compliant.

03 / 11 / 2019 Chris Connor

Nearly Half of Second-Hand Storage Devices Contain Personal Information

New research has found that nearly half of second hand storage devices contain personal information.

12 / 22 / 2017 Chris Connor

How Unwanted Apps May Be Spying On You

Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.

09 / 04 / 2018 J.R. Johnivan

iPhone X FaceID Data Is Shared With Developers

Apple's iPhone X has a cool new FaceID feature, but it has questionable privacy implications.

11 / 22 / 2017 Chris Connor

This is How to Protect Yourself From Ransomware Attacks

Ransomware is on the rise. Learn how to be prepared and protect yourself.

11 / 04 / 2019 Chris Connor

1 ... 7 8 9 10 11
Total 11 pages