A USB stick is small enough that a thief can walk away with one without you knowing until it is too late. In this situation, anger can quickly turn to horror if you use your USB stick to store ...
I carry a USB drive pretty much everywhere, mostly for quick file transfers between PCs. But at some point, I realized I could do a lot more with it than just moving files around. For instance, you ...
I'm finding that I'm carrying more and more of my life on USB flash drives. There seemed to be something so wrong about storing data on something which, if I lost, could give someone else access to my ...
We’ve all lost a flash drive or two. Whether it was a cheap USB drive containing some promotional material, or top secret one detailing the security protocol pertaining to a certain Queen of England’s ...
The humble USB drive needn't be a security risk if you have the right precautions in place. In an age of online cloud storage, you’d be forgiven for thinking that physical storage media no longer had ...
NarsiReddy Cheruku wants a way to encrypt files that are stored on a flash drive or external hard drive. Flash drives are easy to lose. And anything lost can fall into the wrong hands. So if you’re ...
In light of recent events regarding the NSA tapping into personal data mines without warrant, interest in securing the cloud has significantly risen these past few months. Most cloud providers offer ...
The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it’s a Chrome app that aims to make it easy to create and share single encrypted files with others ...
The best way to be sure no one is accessing your files is to lock them on an encrypted drive. The Kingston Ironkey Keypad 200 includes built-in keypad so you can easily unlock the USB drive when it’s ...
Sending important files over the web is a task that is practiced on a daily basis around the world. With the rise in cyber attacks, computer users should always consider encrypting their files before ...
It probably doesn’t matter much for the hacker who sleeps with a bag of various microcontroller flash programmers under the pillow, but for an end-user to apply a firmware upgrade, convenience is king ...