Personal Tech 3 This article is more than 1 year old Freecom Secure 3 Swipe your card, gain access to your external HDD Tony Smith Mon 26 Oct 2009 // 08:02 UTC CrystalDiskMark 2.2 Results Data throughput in Megabytes per Second (MB/s) Longer bars are better File Transfer Results 2GB File 1GB Folder File-transfer speed in Megabytes per Second (MB/s) Longer bars are better Get our Tech Resources Next page: Verdict Page: ← Prev 1 2 3 4 Next → Share More about Encryption Review Security More like these × More about Encryption Review Security Narrower topics Authentication Black Hat Common Vulnerability Scoring System Cybercrime Cybersecurity Cybersecurity and Infrastructure Security Agency Cybersecurity Information Sharing Act Data Breach Data Protection Data Theft DDoS Digital certificate Exploit Firewall Hacker Hacking Identity Theft Infosec Kenna Security Let's Encrypt NCSC Palo Alto Networks Password Phishing Ransomware REvil Signal Spamming Spyware Surveillance TLS Trojan Trusted Platform Module Vulnerability Wannacry Zero trust More about Share 3 COMMENTS More about Encryption Review Security More like these × More about Encryption Review Security Narrower topics Authentication Black Hat Common Vulnerability Scoring System Cybercrime Cybersecurity Cybersecurity and Infrastructure Security Agency Cybersecurity Information Sharing Act Data Breach Data Protection Data Theft DDoS Digital certificate Exploit Firewall Hacker Hacking Identity Theft Infosec Kenna Security Let's Encrypt NCSC Palo Alto Networks Password Phishing Ransomware REvil Signal Spamming Spyware Surveillance TLS Trojan Trusted Platform Module Vulnerability Wannacry Zero trust TIP US OFF Send us news
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database More light shed on what went down with Marko Elez, thanks to NY AG and co's lawsuit CSO17 Mar 2025 | 94
Apple's alleged UK encryption battle sparks political and privacy backlash National security defense being used to keep appeal behind closed doors Security14 Mar 2025 | 81
Microsoft isn't fixing 8-year-old shortcut exploit abused for spying 'Only' a local access bug but important part of N Korea, Russia, and China attack picture Research18 Mar 2025 | 18
Data deluge pushes financial services deeper into AI Harnessing AI to optimize applications and services is crucial but building the infrastructure is equally important Sponsored Feature
We call this kernel saunters: How Apple rearranged its XNU core with exclaves iPhone giant compartmentalizes OS for the sake of security Research8 Mar 2025 | 18
How NOT to f-up your security incident response Feature Experts say that the way you handle things after the criminals break in can make things better or much, much worse CSO10 Mar 2025 | 14
CISA pen-tester says 100-strong red team binned after DOGE canceled contract Updated Election infosec advisory center also shuttered Public Sector12 Mar 2025 | 160
So … Russia no longer a cyber threat to America? Comment Mixed messages from Pentagon, CISA as Trump gets pally with Putin and Kremlin strikes US critical networks Public Sector4 Mar 2025 | 218
Expired Juniper routers find new life – as Chinese spy hubs Fewer than 10 known victims, but Mandiant suspects others compromised, too Cyber-crime12 Mar 2025 | 5
Apple drags UK government to court over 'backdoor' order Updated A first-of-its-kind legal challenge set to be heard this month, per reports Security5 Mar 2025 | 119
'Dead simple' hijacking hole in Apache Tomcat 'now actively exploited in the wild' Updated One PUT request, one poisoned session file, and the server’s yours CSO18 Mar 2025 | 8
The Badbox botnet is back, powered by up to a million backdoored Androids Best not to buy cheap hardware and use third-party app stores if you want to stay clear of this vast ad fraud effort Cyber-crime7 Mar 2025 | 10