Stealth Engine is a simplified version of the Steam Engine coil calculator, brought to you by StealthVape. If you want all the options,...
Showing results 1 to 20 of 1,855
New rules will stop apps from interfering with user control of extensions and settings in all browsers. Other products do this, but Microsoft now makes it a baseline protection.
The week in iOS: Apple hit with $350 million suit over iPod, patent grant to protect dropped phones, and shifted selfie camera.
Security vendors enable extra layers of security for AWS as well as tout new reference architectures for the cloud.
It's time for businesses to start protecting customer privacy and data as conscientiously as they protect their own. Wait. No, better that that.
The $80 million cash deal will allow the network data storage provider to expand the flexibility of its data backup and protection services.
Top 5 Best Free VPN ServicesA Virtual Private Network is a great way to surf the web more securely or access video content that is...
At times of crises like POODLE, Heartbleed and Shellshock, a good network IPS often provides effective protection long before it's practical to have systems patched.
Intel Data Protection Technology for Transactions encrypts transaction data from end to end, even from card readers.
ABC Phonics Spelling is based on the Montessori phonics method, which teaches letter sounds for: short vowels, consonants, blends and...
Glass screen protectors provide unparalleled clarity while also providing the same touch and feel of your native glass display. ZAGG's Glass product is easy to install and looks great.
STM creates some affordable cases for Apple iPhone devices and Matthew Miller spent several days testing out its newest Harbour shell case.
Endpoint data protection company Druva thinks it has a more efficient take on cloud backups and archives.
There are lots of broken displays on iPhones and Samsung smartphones and now Samsung is offering accidental damage protection. Is this a smart purchase or not?
Germany is applying new pressure on Google to comply with its national data protection laws.
Sponsored by Redhat and Intel
Countering threats against cloud infrastructure involves creating and fortifying three critical layers of protection.
The Victorian government has replaced the Information Privacy Act with the Privacy and Data Protection Act 2014 to address the protection levels of personal information collected and used by public agencies.
Businesses need security tools that are integrated, coordinated, and able to communicate with each other across the network to provide unified "context-aware" protection, says Sophos CTO.
The latest models include an all-in-one with a touchscreen option, while all feature Smart USB Protection technology allowing IT staff to control access to the system's USB ports.
From the right to be forgotten to data sovereignty, Europe's plans for new data protection laws raise some tricky issues for the cloud industry and all its customer companies.
If the field of big data looks like a huge opportunity to those looking to harvest intelligence, then the Information Commissioner has three words for them: not so fast.
Google, Microsoft, and Yahoo are meeting data protection officials in Brussels to discuss how best to handle right to be forgotten requests.
The Italian data protection watchdog has brought in new regulations that will see Google forced to change how it collects, handles, and stores users' data.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)