The hacker group that stole user data from adult network Ashley Madison dumped 10GB of files, revealing client information. But it's not just about infidelity, but more about privacy.
In a previous article, we provided a step-by-step guide on email encryption for webmail accounts. This article shows how to enable email encryption on Microsoft Outlook 2010.
While Windows 10 has been praised for merging the best of Windows 7 and 8 with new security features, it also received flak for features that could be used to violate user privacy. Does it deserve the bad rap?
Following recent security breaches, the US administration wants encryption that's more "law-enforcement friendly". Apart from the existing problems that surround this issue, find out why encryption could be an ambiguous tool.
While passwords stop outsiders from gaining access to your accounts and devices, it can’t protect stored or transmitted data. Encryption can. Learn what it is, how it works, and how it can protect you.
Online "cheating network" Ashley Madison recently got hacked, and the hackers are threatening to expose its users' personal information unless their demands are met. The interesting part: They're not asking for money.
Going on a European vacation this summer? Here are some of the threats we've seen that target travelers and tourists, from phishing pages that use vacation-related keywords to risky mobile apps found in the region.
There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.