I’ve been using various incarnations of PGP (Pretty Good Privacy) encryption software for almost as long as I’ve been a Mac user. I won’t go into PGP’s long ...
Software company Network Associates has stopped marketing its PGP e-mail encryption software, a further sign that privacy products are a tough sell. The Santa Clara ...
PGP is adding a virus-defense tool to its line of secure-messaging products. The company said it will bundle Symantec's AntiVirus Scan Engine with its PGP Universal products to minimize the risk of ...
A team of researchers in Europe uncovered a way to pull the plain text from emails secured with PGP and S/MIME encryption. But not everyone agrees on the severity of the threat. When he's not battling ...
PGP software’s main function is to encrypt e-mail messages and files on a PC. PGP Enterprise 8.0 and PGP Desktop 8.0 offer features meant for use in business environments, such as integration with ...
Anyone using PGP to encrypt their email could have their messages exposed thanks to a severe vulnerability for which there's no proper fix. That's according to researchers in Germany, who said anyone ...
The man credited with inventing PGP has teamed up with other key developers to assure users that the popular encryption program is not insecure, despite some reports to the contrary earlier this month ...
NEW YORK -- I'm well aware that sending e-mail is no more private than sending a postcard, but who wants to bother with protecting messages? It's so inconvenient. So, too lazy to phone, I e-mail ...
There are endless utilities available to encrypt files, drives, e-mail, and more using a password, but if you use a simple password, like your dog's name, you might ...
Three years ago, Ars declared the SHA1 cryptographic hash algorithm officially dead after researchers performed the world’s first known instance of a fatal exploit known as a "collision" on it. On ...
Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. Read now Most ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results