A video tutorial explaining how to use a file encryption software called "Mujahideen Secrets 0.0.2" has been posted today on the militant Islamist military preparation forum al M3arek. The 27-minute ...
Cypherix, a software company that has made a name for itself by supplying data security solutions for major entities like the Federal Reserve, the Mitsubishi Trust, and Lockheed Martin, has announced ...
VSEncryptor is a very easy-to-use encryption tool which allows you to encrypt any type of file or text. With VSEncryptor you can encrypt a file with a password – but remember – you can decrypt the ...
Sending important files over the web is a task that is practiced on a daily basis around the world. With the rise in cyber attacks, computer users should always consider encrypting their files before ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted developer of world-class data encryption software, has announced the release of BestCrypt Explorer, a mobile file manager on Android and an extension of ...
Nokia and Pointsec Mobile Technologies have jointly developed a solution to protect the data in enterprise customers’ mobile devices. The new file encryption system, Pointsec for Symbian OS, enables ...
The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it’s a Chrome app that aims to make it easy to create and share single encrypted files with others ...
Editors' Blog / Analysis & Opinion News Live Blog Morning Memo Cafe / outside voices & analysis Muckraker / scandal & investigations Prime / Member Exclusives Podcast Features Memberships View Options ...
Though CenturionSoft’s CenturionMail 3.0 did not meet the criteria for our server-based testing, its software is quite good, so we’ve included a brief summary of what it offers. CenturionSoft was ...
Talk about being at the right place and at the right time. Following revelations of government spying, data breaches, malicious hacking, identity theft and other online threats, the email and file ...
Without the MacOS update released this week, Apple’s disk encryption can be easily defeated by connecting a specially crafted device to a locked Macbook. The attack is possible because devices ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results