We’ve had BEAST, Lucky Thirteen, BREACH, BEAST, POODLE, Heartbleed and FREAK…now, it’s LOGJAM. Paul Ducklin explains, and tells you what you can do about it.![]()
Daily Archives: May 21, 2015
Practical IT: What is encryption and how can I use it to protect my corporate data?
Businesses often don’t realise why encryption is important, and how they can use it to protect their data. The latest in our Practical IT series tells you what encryption is and how you can use it in your business.![]()
How your next password could be your brain
Researchers found that brains react to acronyms in a way that’s unique to each individual. Ready to slap some electrodes on your head?![]()
Apple Watch lets nimble-fingered crooks use your Apple Pay
Nimble-fingered crooks can exploit the one-second lag before Watch senses it’s off a wrist and asks for a passcode. ![]()
