Printing, document capture and compliance risk in the GDPR era
Printers, scanners and mobile devices that capture data from documents all store data in some way or other. How can […]
Printers, scanners and mobile devices that capture data from documents all store data in some way or other. How can […]
The new iPhones announced on Wednesday, the iPhone XS, the XS Max, and the XR, only use FaceID, TouchID’s heir […]
Security experts almost uniformly agree that it is dangerous to design encryption to ensure investigators can have access to everything. […]
A team of security researchers has raised the alarm about some cryptography-related issues with the newly released WebAuthn passwordless authentication […]
Google and other tech companies have been on a mission to kill passwords. It’s easy enough to see why. We […]
The traditional systems that are being used in healthcare today are woefully lacking in the security that could be available. […]
Apple has removed the #1 selling anti-malware app called Adware Doctor from the Mac App Store because it was gathering […]
The attackers behind a data breach that left thousands of British Airways customer details exposed have been identified by security […]
The numbers show that unintentional or inadvertent incidents – those typically caused by human error rather than malicious intent such […]
When a data breach occurs it’s not just confidential information that’s attacked. Comparitech analyzed 28 breaches suffered by 24 companies […]
Millions of home Wi-Fi networks are currently at risk of being hacked as weaknesses exist in how saved passwords in […]
In a move aimed at upping standards across biometric user verification systems, the industry consortium, Fido Alliance, has launched a […]