Encryption

Encryption | News, how-tos, features, reviews, and videos

blockchain ecosystem

Blockchain breaks out in the enterprise

The distributed ledger technology that underpins Bitcoin is showing up in a variety of places. Here's what you need to know to understand all the hype.

Top 25 Windows 10 Free Tools

Get expert tips for fixing Windows 10 problems

Free download: Learn how to solve the biggest Windows 10 headaches, discover built-in tools for fixing common Windows 10 problems, and explore advanced utilities for troubleshooting Windows 10.

Boost your Chromebook productivity

Are you getting the most from your Chromebook? Here's how to print documents, protect yourself with a VPN, and add Android apps.

Global economic technology prospects: China and the United States of America

Why U.S. tech needs to fear China

China’s focusing on everything from supercomputers and chips to R&D and science education. In the U.S., budget cuts prevail. Here's what you need to know.

cdm april2017 cover

Computerworld's IT Salary Survey 2017 results

Our free 29-page report shows current salaries for dozens of tech titles, plus details about IT pros' top concerns, the state of the job market and the hottest tech specialties.

Held hostage! The latest on ransomware

Ransomware attacks have been on the rise in recent months; would-be thieves even threatened iOS users with wiped devices. Here’s what you need to know.

internet security privacy

Windows 10 data collection: What you need to know

The operating system has been collecting telemetry on users and apps since 2015; despite recent changes, it’s still gathering information.

Free data visualization with Microsoft Power BI: Your step-by-step guide

We'll show you how to analyze a file with more than two million records of U.S. airline flight delays in this hands-on tutorial.

apple pay

Mobile-payment mayhem

Mobile payments have been slow to catch on in the United States. Here's what you need to know about why.

6 Big Ideas in Digital Transformation

Fire up your IT department with 6 big ideas in digital transformation

This 49-page report features advice from IT executives at Nationwide, Hunter Douglas, Vanguard and more for using digital technologies to become more agile, more flexible and more profitable.

Computerworld - Premier 100 Technology Leaders 2017 - Statistics and highlights [3x2 teaser]

Computerworld's 2017 Premier 100 Technology Leaders: Highlights and stats

Facts and figures about the honorees’ 2017 budgets, purchasing plans, staffing needs and more.

Computerworld - Premier 100 Technology Leaders 2017 [opener]

Computerworld's 2017 Premier 100 Technology Leaders: Photos and profiles

The full listing of honorees with their photographs and short profiles. Download the PDF to print and share with your colleagues.

fast computer server speed

SK Telecom pushes for interoperable quantum crypto systems

SK Telecom and Nokia have developed a prototype quantum cryptography system that combines the South Korean company's quantum key server with an encryption device from Nokia.

cog systems d4 secure htc a9 ip address

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of...

Digital Key encryption

The SHA1 hash function is now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

Digital Key encryption

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bit torrent websites, and users who fall victim to it won't be able to recover their files -- even if they pay.

data protection lock chain

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.

Digital Key encryption

Ransomware disrupts Washington DC's CCTV system

Around 70 percent of police cameras in Washington D.C. were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack.

code programming software bugs cybersecurity

GPG Suite updated for secure email on OSX Sierra

GPG Suite, an application that brings encrypted email to Mac OS, is now available in public beta for Sierra.

img 20170120 171638 01

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging.

Load More