Find Command Cheat Sheet Free from Linux Training Academy Download Now!
Welcome Guest | Sign In

Results 21-40 of 66 for PGP (0.001 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Richard Adhikari
Malware Munches on Mitsubishi, and Certificates Can Lie
09/20/11 5:00 AM PT | TechNewsWorld | 650 Words

PKI is the underlying technology for Internet standards such as Transport Layer Security, which is the successor to the Secure Sockets Layer (SSL); Pretty Good Privacy (PGP); and Gnu Privacy Guard (GPG), a GPL-licensed alternative to PGP .

Flaws in PKI,...

Kyle Parris
Can't We All Just Get Along? Post-Merger IT Integration
02/04/10 5:00 AM PT | TechNewsWorld | 977 Words

SSH or PGP Encryption: Why Choose?
One company may have standardized on SSH encryption and the other on PGP encryption. Selecting an MFT solution that can handle flow from origin to destination using any encryption method eliminates the problem of...

Kyle Parris
3 Tips for Brushing Up B2B Security
07/02/09 4:00 AM PT | TechNewsWorld | 1043 Words

If your audit identifies the use of an insecure protocol such as FTP or HTTP , the next step is to migrate that connection to a secure protocol that uses SSL or PGP with data encryption such as FTP with PGP ,...

Jeff Meisner
Report: Customer Data Breach Costs Head Skyward
02/03/09 8:46 AM PT | E-Commerce Times | 679 Words

... cost of data breaches continued to rise in 2008, according to a new study from network security company PGP and the Ponemon Institute . The study, which was sponsored by PGP , surveyed 43 organizations across 17 different sectors and evaluated the...

John P. Mello Jr.
Russian Firm Files Patent for Password Cracker
10/25/07 10:13 AM PT | TechNewsWorld | 671 Words

"I don't think it's a breakthrough at all," John Callas, chief technology officer for the global security software company PGP in Palo Alto, Calif., told TechNewsWorld.

He cited research at Columbia Univeristy in New York City in the 2003 to 2005...

Keith Pasley
Tackling the Secure Web Mail Challenge
02/04/04 4:21 AM PT | E-Commerce Times | 1432 Words

Various cryptographic schemes are in use today. PGP and S/MIME, both widely implemented in the form of browser plug-ins or integration APIs, are widely used and well understood. Both of these methods encrypt the e-mail message itself. On the other hand, SSL and...

Courtesy of
Daily Cybercrime and Security Report
03/22/01 11:41 AM PT | E-Commerce Times | 256 Words

Info World: A Fly in PGP's Ointment?
21-Mar-01 20:01:55 ET

Story Highlights:
"A Czech company is hoping to make a big splash at the world's largest trade show this week by publicizing an alleged vulnerability in PGP (Pretty Good...

John P. Mello Jr.
Code Cracker Turing to Be on 50-Quid Notes
07/16/19 12:09 PM PT | TechNewsWorld | 1038 Words

Turing shortened the war, said Phil Zimmermann, author of the PGP encryption program and an associate professor at the Delft University of Technology in the Netherlands.

"We would have had a very different experience in the Normandy invasion if we didn't...

John P. Mello Jr.
Mozilla Offers Free Secure File-Sharing Service
03/13/19 5:00 AM PT | TechNewsWorld | 999 Words

"It's an interesting product," said Phil Zimmermann, creator of PGP encryption and an associate professor at Delft University of Technology in the Netherlands.

"It's certainly better than a service that uploads files without encryption," he told TechNewsWorld, "or uploads encrypted files...

Richard Adhikari
Upcoming iOS Access Restrictions Could Stymie Law Enforcement
06/16/18 5:00 AM PT | TechNewsWorld | 535 Words

"I don't think [USB Restricted Mode] is aimed at law enforcement agencies, however severe the impact to those entities may be," Webroot's Abrams said, likening the feature to PGP .

Loss of Perspective?
USB Restricted Mode "supports our right...

Richard Adhikari
ProtonMail Launches Encrypted Email for iOS, Android
03/18/16 5:00 AM PT | TechNewsWorld | 614 Words

ProtonMail's encryption is fully compatible with PGO, "because PGP has withstood the test of time -- over 20 years now -- and is well trusted and vetted by the community," Yen said.

Other Secure Email Systems
Several other secure...

Richard Adhikari
Keybase Releases Encrypted File-Sharing iPhone App
02/08/16 10:43 AM PT | TechNewsWorld | 661 Words

The system "is a lot less complex than PGP keys and far harder to compromise, particularly with man-in-the-middle exploits," observed Rob Enderle, principal analyst at the Enderle Group .

However, sync products "are generally more convenient, particularly if you're offline a...

Jack M. Germain
Linux Foundation Security Checklist: Have It Your Way
09/06/15 4:15 PM PT | LinuxInsider | 1076 Words

Among them are running automatic operating system updates, disabling the SSH server on the workstation, storing authentication, having signing and encryption keys on smartcard devices, and putting PGP master keys on removable storage.

There are moderate and low severity guidelines for Web-surfing...

Richard Adhikari
Cameron Takes Hard Line on Encrypted Communications
01/15/15 3:03 PM PT | TechNewsWorld | 641 Words

"Anyone in the UK or out of it could use freely available alternatives" like PGP and OTR to secure their communications, the EFF's O'Brien noted. Banning encrypted apps "would devastate their industry's trust in online communications, leading to a mass exodus of...

John P. Mello Jr.
Apple Fills iOS 8 Security Basket to Brim
09/19/14 7:07 AM PT | TechNewsWorld | 775 Words

"A four-digit PIN is easy to exhaust," Phil Zimmermann , author of one of the most widely used encryption systems in the world, PGP , told TechNewsWorld. "It's only 10,000 possibilities. That's ridiculously small."

However, combining the PIN with the UID...

Richard Adhikari
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
06/18/14 12:45 PM PT | E-Commerce Times | 607 Words

BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first...

Richard Adhikari
Snowden's Beloved Tails OS Reaches v1.0 Milestone
05/01/14 2:29 PM PT | LinuxInsider | 604 Words

Tails "is a nicely packaged distribution of common security tools like Tor and PGP," Daniel Castro, senior analyst at The Information Technology & Innovation Foundation , told LinuxInsider. "All of this is available today."

In fact, the developers admit Tails...

Richard Adhikari
Kaspersky Details Sophisticated 'Mask' Robber Ops
02/11/14 2:41 PM PT | TechNewsWorld | 608 Words

It can intercept network traffic, keystrokes, Skype conversations and PGP keys, according to Kaspersky. Mask also can analyze WiFi traffic, fetch information from Nokia devices, capture screens and monitor file operations.

It's likely that the Nokia phones were specifically included because...

Katherine Noyes
The Blackphone vs. the NSA
01/20/14 9:19 AM PT | LinuxInsider | 1391 Words

"Blackphone is the world's first smartphone to put privacy and control ahead of everything else," according to the website for the project, which is led by none other than PGP creator and privacy guru Phil Zimmermann, along with Silent Circle and Geeksphone.

Patrick Nelson
Silent Text: Basic Anonymity at a Hefty Price
11/08/13 5:00 AM PT | LinuxInsider | 563 Words

The voice or phone app uses the ZRTP key agreement protocol designed by the creator of PGP , or Pretty Good Privacy -- a guy called Phil Zimmermann who is widely regarded as the father of encrypted communication tools.

What Is...

Previous 1 2 3 4 Next

Search for: In:

How do you feel about government regulation of the U.S. tech industry?
Big tech companies are abusing their monopoly power and must be reined in.
Stronger regulations to protect consumer data definitely are needed.
Regulations stifle innovation and should be kept to the barest minimum.
Over-regulation could give China and other nations an unfair advantage.
Outdated antitrust laws should be updated prior to serious regulatory efforts.
Tech companies should regulate themselves to avoid government intervention.