News

Researchers have used quantum physics to reversibly scramble videos so that even future quantum computers won’t be able to hack them.
Taceo has created software for companies to verify or compute information without decrypting it. Check out the deck it used ...
Ingram Micro has been added to SafePay’s data leak site, meaning the countdown is on before terabytes of data are leaked on ...
Technology surges forward, but not everyone moves with it. This guide aims to teach essential cyber hygiene to people who didn’t grow up online.
Experts told lawmakers that quantum computers will soon render today's encryption obsolete — and foreign adversaries know it.
Newly disclosed vulnerabilities in SAP GUI for Windows and Java store user data with outdated or no encryption, posing compliance and breach risks for enterprises.
As Jaws celebrates its 50th anniversary, Science News explores the vast range of shark sizes, from megaladon to the dwarf lanternshark.
Learn how data fabric addresses fragmentation, compliance, and Shadow IT to deliver robust, centralized data protection and governance.
A recently discovered ransomware strain is making things even trickier by offering a new wiping option that allows affiliate criminals to completely destroy data after encryption.
Learn how BaaS offers cloud-based data protection against cyberattacks and outages. Discover its benefits including cost savings, efficient storage, and seamless disaster recovery in the cloud.