These tools let you encrypt your entire USB drive with a password, making it nearly impossible for anyone without the password to access the data. Using these built-in options is often the easiest way ...
It may not be the savior we imagined, but it might be one that could be just weird enough to work. A new, unconventional film ...
I'm looking at a new USB drive 4GB is more than enough for my needs.<BR><BR>HOWEVER, I do want encryption on the drive.<BR><BR>My sensitive files I encrypt with ...
San Jose, CA - January 14, 2009 - SPYRUS, Inc. today announced the Hydra Privacy Card' (Hydra PC(tm)) family of USB encrypting devices is immune from USB autorun ...
San Jose, CA " February 23, 2009 " SPYRUS, Inc. today announced Hydra PC Virus Protected (ViP) USB encryption drives incorporating antivirus protection from McAfee' Scan Engine technology. Combining ...
(Sorry if this isn't the right subforum, but it felt like the best place to at least start). This question has probably been asked a thousand times before, and I'll ask it again because there doesn't ...
Kingston has launched its new IronKey Vault Privacy 50 USB drive featuring XTS-AES 256-bit Encryption and FIPS 197 Certification. The IronKey Vault Privacy 50 ...
TrueCrypt is a powerful, free, open source program that allows you to create encrypted volumes on your computer, or to encrypt entire disks, including your system disk. Furthermore, it allows you to ...
This simple USB trick adds physical security to your PC without buying extra hardware.
The following content is brought to you by Mashable partners. If you buy a product featured here, we may earn an affiliate commission or other compensation. TL;DR: Keep your sensitive data safe with ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...