Self-wiping hard drive from Toshiba boosts security

Toshiba has come up with a type of self-encrypting hard drive (SED) that can automatically wipe data if it is removed from a paired computer by an attacker.Available in capacities up to 640GB,

Published on: April 14th, 2011 John E. Dunn

Video Rewind: The hard drive crusher

What do you do with your old PCs? You can donate it to a charitable group, or sell it or you can turn it into a lampshade. Whatever you decide, security experts advise

Published on: April 14th, 2011 Nestor Arellano

Choosing the right cloud storage service for your business

Backup is one of the oldest needs in computing. Whether it's hard disk failure, computer theft, or just a wandering three year-old with a fruit juice carton, it's very easy to lose data

Published on: April 1st, 2011 Keir Thomas

Study reveals best ways to secure data in SSDs

Until a university study emerged last week, few experts suspected that it's more difficult to erase data stored on solid-state drives (SSD) than that on hard disk drives (HDDs).Industry experts were taken aback

Published on: March 1st, 2011 Lucas Mearian

Know when to hold it, know when to Shred it

Early this year, the Bruyere Family Medical Centre in Ottawa warned its patients to keep an eye on their credit ratings because two of the clinic's computers storing the personal information of about

Published on: February 23rd, 2011 Nestor Arellano

Organize iPad content securely with Yojimbo for iPad

Users of Bare Bones Software's information organizer Yojimbo 3 have a new way to access their data. Yojimbo for iPad is a new companion product to the Yojimbo Mac software. An iPad tab

Published on: January 27th, 2011 Stuart Gripman

Security measures launched after attack on Zuckerberg’s Facebook fan page

Security and privacy experts yesterday welcomed Facebook's deployment of new security tools using HTTPS (hypertext transfer protocol secure) and what it called "social authentication." The measures were announced less than 24 hours after

Published on: January 27th, 2011 Nestor Arellano

4 tools to protect and manage multiple passwords

When the popular Web site Gawker was hacked into recently, more than a million user IDs and passwords were released. If you were one of the people compromised that's annoying -- very annoying.

Published on: January 6th, 2011 Steven Vaughan-Nichols

Trend Micro fortifies mobile security with acquisition

Trend Micro announced that it has signed a definitive agreement to acquire Mobile Armor--a company that specializes in endpoint data protection. The move strengthens Trend Micro's data protection capabilities and positions it to

Published on: November 30th, 2010 Tony Bradley

Most BlackBerry owners not concerned about government negotiations

After a series of governments threatened BlackBerry bans, Research in Motion (RIM) negotiated to avoid service cut-offs. Canadians are split on whether the devices are actually now less secure or not. In a poll

Published on: November 10th, 2010 Brian Jackson

How to secure iPads for business use

When Apple's iOS 4.2 debuts next month, it will offer enough features to make the iPad tablet a device that's safe for business if IT security teams take the right steps. Top among

Published on: October 25th, 2010 Tim Greene

BitDefender 2011 offers balanced security protection for home offices

BitDefender is trying to strike a balance between security protection and speed with its small home office software, and selling it at an affordable price starting Aug. 17.The Bucharest, Romania-based security vendor doesn’t

Published on: August 13th, 2010 Brian Jackson

Windows 7 security features you didn’t know about

The words Windows and security have not always been compatible. In the past, Microsoft's quest to make its operating system as easy to manage as possible for the "typical" user has often meant

Published on: August 5th, 2010 Logan Kugler

‘Timing attack’ could affect millions of Web users

A well-known cryptographic attack could be used by hackers to log into Web applications used by millions of users, according to two security experts who plan to discuss the issue at an upcoming

Published on: July 19th, 2010 Robert McMillan