Showcase Your Business as a Thought Leader » Publish Your Blog, Videos and Events on ALL EC » Save 25% Now
Welcome Guest | Sign In

Results 1-20 of 64 for PGP (0.001 secs).

Searching: Articles | Discussions

Sorted by Date | Sort by Relevance

Richard Adhikari
Upcoming iOS Access Restrictions Could Stymie Law Enforcement
06/16/18 5:00 AM PT | TechNewsWorld | 535 Words

"I don't think [USB Restricted Mode] is aimed at law enforcement agencies, however severe the impact to those entities may be," Webroot's Abrams said, likening the feature to PGP .

Loss of Perspective?
USB Restricted Mode "supports our right...

John P. Mello Jr.
Highly Sensitive Encrypted Email at Risk of Exposure
05/15/18 9:36 AM PT | TechNewsWorld | 661 Words

... newfound flaw in email clients that use PGP and S/MIME to encrypt messages can be exploited to expose the plain text of the missives, according to a paper published Monday. By injecting malicious snippets of text into encrypted messages, attackers can use...

Jack M. Germain
Google Invites Open Source Devs to Give E2EMail Encryption a Go
03/04/17 10:40 AM PT | LinuxInsider | 797 Words

It replaces the problematic web-of-trust model traditionally used with PGP , they pointed out.

"Google announced end-to-end email encryption almost three years ago, and no product or solution ever materialized," said Morey Haber, vice president of technology at BeyondTrust .


Richard Adhikari
ProtonMail Launches Encrypted Email for iOS, Android
03/18/16 5:00 AM PT | TechNewsWorld | 614 Words

ProtonMail's encryption is fully compatible with PGO, "because PGP has withstood the test of time -- over 20 years now -- and is well trusted and vetted by the community," Yen said.

Other Secure Email Systems
Several other secure...

Richard Adhikari
Keybase Releases Encrypted File-Sharing iPhone App
02/08/16 10:43 AM PT | TechNewsWorld | 661 Words

The system "is a lot less complex than PGP keys and far harder to compromise, particularly with man-in-the-middle exploits," observed Rob Enderle, principal analyst at the Enderle Group .

However, sync products "are generally more convenient, particularly if you're offline a...

Jack M. Germain
Linux Foundation Security Checklist: Have It Your Way
09/06/15 4:15 PM PT | LinuxInsider | 1076 Words

Among them are running automatic operating system updates, disabling the SSH server on the workstation, storing authentication, having signing and encryption keys on smartcard devices, and putting PGP master keys on removable storage.

There are moderate and low severity guidelines for Web-surfing...

Richard Adhikari
Cameron Takes Hard Line on Encrypted Communications
01/15/15 3:03 PM PT | TechNewsWorld | 641 Words

"Anyone in the UK or out of it could use freely available alternatives" like PGP and OTR to secure their communications, the EFF's O'Brien noted. Banning encrypted apps "would devastate their industry's trust in online communications, leading to a mass exodus of...

John P. Mello Jr.
Apple Fills iOS 8 Security Basket to Brim
09/19/14 7:07 AM PT | TechNewsWorld | 775 Words

"A four-digit PIN is easy to exhaust," Phil Zimmermann , author of one of the most widely used encryption systems in the world, PGP , told TechNewsWorld. "It's only 10,000 possibilities. That's ridiculously small."

However, combining the PIN with the UID...

John P. Mello Jr.
Is Open Source an Open Invitation to Hack Webmail Encryption?
08/21/14 11:21 AM PT | TechNewsWorld | 1305 Words

Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP , the encryption scheme Yahoo and Google will be using for their webmail.

"If someone does find a bug and sits on it, someone else will find the...

John P. Mello Jr.
Yahoo, Google Team Up to Fight Email Snoops
08/13/14 6:20 AM PT | E-Commerce Times | 768 Words

That's a risk worth taking, according to Phil Zimmermann, creator of PGP , or pretty good privacy -- the encryption method to be used by Yahoo and Google.

"The benefits of having everyone else look at it far outweigh the problem...

Richard Adhikari
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
06/18/14 12:45 PM PT | E-Commerce Times | 607 Words

BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first...

Richard Adhikari
Google Releases Email Encryption Tool Alpha
06/06/14 5:00 AM PT | TechNewsWorld | 645 Words

These are supported only in GnuPG 2.1 and later, as well as Symantec's PGP software, Google said.

End-to-End supports RFC 4880, the OpenPGP Message Format, and RFC 6637, Elliptic Curve Cryptography, in OpenPGP.

The source code is built on a JavaScript...

Richard Adhikari
Snowden's Beloved Tails OS Reaches v1.0 Milestone
05/01/14 2:29 PM PT | LinuxInsider | 604 Words

Tails "is a nicely packaged distribution of common security tools like Tor and PGP," Daniel Castro, senior analyst at The Information Technology & Innovation Foundation , told LinuxInsider. "All of this is available today."

In fact, the developers admit Tails...

Katherine Noyes
Wiliest Ways to Keep the NSA at Bay
02/28/14 3:36 PM PT | LinuxInsider | 1326 Words

'They're Capturing Your Browsing'
"I'd recommend making phone calls with Silent Phone," Zimmermann suggested, and "for email, PGP , GnuPG or something like it."

As for other online activities, "there's a lot of things you do on the Internet...

Richard Adhikari
Kaspersky Details Sophisticated 'Mask' Robber Ops
02/11/14 2:41 PM PT | TechNewsWorld | 608 Words

It can intercept network traffic, keystrokes, Skype conversations and PGP keys, according to Kaspersky. Mask also can analyze WiFi traffic, fetch information from Nokia devices, capture screens and monitor file operations.

It's likely that the Nokia phones were specifically included because...

Katherine Noyes
The Blackphone vs. the NSA
01/20/14 9:19 AM PT | LinuxInsider | 1391 Words

"Blackphone is the world's first smartphone to put privacy and control ahead of everything else," according to the website for the project, which is led by none other than PGP creator and privacy guru Phil Zimmermann, along with Silent Circle and Geeksphone.

Patrick Nelson
How to Encrypt Your Email
12/05/13 5:00 AM PT | TechNewsWorld | 630 Words

Open source versions of Zimmermann's original PGP, called OpenPGP, have been adapted by some email service vendors.

How It Works
PGP encrypts a message using a symmetric encryption algorithm -- symmetric key algorithms are a shared secret between parties.

Patrick Nelson
Silent Text: Basic Anonymity at a Hefty Price
11/08/13 5:00 AM PT | LinuxInsider | 563 Words

The voice or phone app uses the ZRTP key agreement protocol designed by the creator of PGP , or Pretty Good Privacy -- a guy called Phil Zimmermann who is widely regarded as the father of encrypted communication tools.

What Is...

Jack M. Germain
OpenPGP Studio Keeps Prying Eyes Off Your Personal Data
09/18/13 5:00 AM PT | LinuxInsider | 1189 Words

GoAnywhere OpenPGP Studio is an easy-to-use, cross-platform desktop tool by Linoma Software that protects files using the OpenPGP encryption standard....

Richard Adhikari
NSA Breaks Data Encryption, Tech Firms Break Trust
09/07/13 5:00 AM PT | TechNewsWorld | 658 Words

Users can turn to end-to-end encrypting technologies such as PGP and S/MIME, which "appear to be strong and safe," or to startups such as Silent Circle and , which offer highly secure end-to-end encrypted products, the CDT's Hall said.


1 2 3 4 Next

Search for: In:

Where do you most often get your news online?
High-profile blogs
Local newspaper websites
Major newspaper and magazine websites
News aggregator websites
Online-only news and magazine websites
Social networks
TV network/program websites
Salesforce Commerce Solution Guide
Salesforce Commerce Solution Guide