Data Protection
Sort by: publishing date popularity
Video Game Dungeon Defenders 2 Embraces Blockchain
We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?
10 / 31 / 2018 J.R. Johnivan
How Do Cryptographic Hash Functions Work?
Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.
10 / 30 / 2018 J.R. Johnivan
Nearly Half of Second-Hand Storage Devices Contain Personal Information
New research has found that nearly half of second hand storage devices contain personal information.
12 / 22 / 2017 Chris Connor
Are Gmail's App Developers Reading Your Emails?
Are third-party app developers reading your personal inbox messages? Short answer: yes.
07 / 28 / 2018 J.R. Johnivan
This is How to Protect Yourself From Ransomware Attacks
Ransomware is on the rise. Learn how to be prepared and protect yourself.
11 / 04 / 2019 Chris Connor
Are Your Backups GDPR Compliant?
The General Data Protection Regulations should not be ignored -- find out how to ensure that your backups are compliant.
03 / 11 / 2019 Chris Connor
How Unwanted Apps May Be Spying On You
Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.
09 / 04 / 2018 J.R. Johnivan