Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn't figure out the venerable crypto program PGP even after ...
Criminals and terrorists, like millions of others, rely on smartphone encryption to protect the information on their mobile devices. But unlike most of us, the data on their phones could endanger ...
Towing the line between keeping your private information secure and still conveniently accessible is always a challenge, but you can make it a little easier—and fun—by coming up with your own simple ...
The prime minister has been giving mixed messages about the government's views on encryption for months, but one thing is clear: no communication is safe from the ambition of government spies. Time ...
Encryption is an essential tool for protecting data—but the technology can be a bit confusing. This ebook explains what encryption is, how it works, and why it’s so important. From the ebook: ...
Flexadex lets you store addresses and phone numbers online, but a lack of Secure Sockets Layer encryption means that your data is not secure. Dennis O'Reilly began writing about workplace technology ...
Baffle Advanced Encryption was designed to overcome the barriers to adopting encryption for analytics. Here’s how it enables compliant, privacy-enhanced computation. For years, data teams worked with ...
The brain behind Cryptocat and miniLock is back with yet another tool designed to make your day-to-day life more secure. Peerio, Nadim Kobeissi’s latest creation, is a cloud-based, end-to-end ...
Businesses should consider self-encrypting drives (SEDs) for new installations that hold significant volumes of sensitive data, says Gartner. This hardware-based encryption method has little impact on ...
The RansomHouse ransomware-as-a-service (RaaS) has recently upgraded its encryptor, switching from a relatively simple single ...