Times have changed, and more than a few tools have come and gone that were designed to encrypt your data and keep it safe from prying eyes or data thieves. It's time for a fresh look. Which ...
The battle over encryption is heating up in Washington. But on the Dark Net, encryption technology has already passed lawmakers by. As the political landscape intensifies around the world, encryption ...
As any CryptoParty attendee will attest, you can only ensure a reasonably private communication by using “strong, end-to-end encryption,” “strong” here meaning nearly impossible to break, even with ...
The digital watchdog Electronic Frontier Foundation (EFF) lent a technical hand to fix security problems in a tool used to encrypt instant messenger conversations using the Adium and Pidgin programs.
NICOSIA, Cyprus, Nov. 13, 2019 /PRNewswire/ -- NordVPN, the world's most advanced VPN service provider, officially launched its latest cybersecurity product — NordLocker. The new tool secures all ...
Palo Alto, Calif.-based encryption vendor PGP on Monday released updates to its core product line, PGP Encryption Platform and Universal Server, to better lock down information and allow resellers the ...
Google is asking developers to take over its effort to make end-to-end email encryption more user-friendly, raising questions over whether it’ll ever become an official feature in the company’s ...
Common Sense Education has made its encryption-checking tools available as open source so that anybody can check out the security settings of education technology products. The release of its security ...
New material leaked by Edward Snowden shows which Internet security protocols the NSA had beaten as of 2012 and which encryption tools were still stymying cyber spies. Our team tests, rates, and ...
A recently released tool that allegedly was designed to help al-Qaeda supporters encrypt their Internet-based communications is a well-written and easily portable piece of code, according to a ...
As law enforcement grumbles over the uptake in encryption services offered by technology firms, Hacking Team is keen to get on in the game and restore its client list through a new set of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results