If your business uses Microsoft's Access database software to manage sensitive data, you'll want to encrypt your database and its tables to prevent them being viewed or manipulated by unauthorized ...
Regular readers know my longstanding interest in the correct Fifth Amendment standard for compelling a suspect to decrypt an encrypted device. The Eleventh Circuit adopted one standard in 2012, but I ...
Posts from this topic will be added to your daily email digest and your homepage feed. Last month, the company announced that threat actors had accessed “certain elements” of customer info. Just as ...
I am pleased to say that the Texas Law Review has published the final version of my article on how the Fifth Amendment applies to compelling a person to enter a ...
Security software company Avast has released a free decryptor for the BianLian ransomware strain to help victims of the malware recover locked files without paying the hackers. The availability of a ...
Czech cybersecurity software firm Avast has released a decryption utility to help TargetCompany ransomware victims recover their files for free. However, as Avast warns, this decryptor can only be ...
Researchers demo weaknesses affecting some of the most popular options Academics say they found a series of flaws affecting three popular password managers, all of which claim to protect user ...