Data Protection
Sort by: publishing date popularity
How Do Cryptographic Hash Functions Work?
Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.
10 / 30 / 2018 J.R. Johnivan
Video Game Dungeon Defenders 2 Embraces Blockchain
We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?
10 / 31 / 2018 J.R. Johnivan
Are Your Backups GDPR Compliant?
The General Data Protection Regulations should not be ignored -- find out how to ensure that your backups are compliant.
03 / 11 / 2019 Chris Connor
Nearly Half of Second-Hand Storage Devices Contain Personal Information
New research has found that nearly half of second hand storage devices contain personal information.
12 / 22 / 2017 Chris Connor
How Unwanted Apps May Be Spying On You
Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.
09 / 04 / 2018 J.R. Johnivan
iPhone X FaceID Data Is Shared With Developers
Apple's iPhone X has a cool new FaceID feature, but it has questionable privacy implications.
11 / 22 / 2017 Chris Connor
This is How to Protect Yourself From Ransomware Attacks
Ransomware is on the rise. Learn how to be prepared and protect yourself.
11 / 04 / 2019 Chris Connor