Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation’s Core Infrastructure Initiative.
Department of Veterans Affairs Secretary R. James Nicholson Monday has announced that all VA computers throughout the agency will be upgraded with enhanced data security encryption systems beginning ...
Encryption secures information by translating it into computer code that’s unreadable to those who don’t have the means to access the information. These means of access can include passwords, ...
A popular open-source program for encrypted communications has a serious flaw that could let Internet attackers slip into servers running the software, said its creators and a security company this ...
In the wake of the Paris terror attacks, some politicians and intelligence officials began rallying for "back doors" into encrypted messaging apps. On Wednesday, FBI ...
Any of these encryption apps can safeguard a file’s contents, but differ in terms of supported platforms, remote capabilities, and features. Large or small, every company has secrets it needs to keep ...
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan to do now for their encryption needs? The first phase of the TrueCrypt audit ...
A new program that encrypts files to extort money from users highlights that attackers don’t need advanced programming skills to create dangerous and effective ransomware threats, especially when ...
If you want something done right, do it yourself. That may sound trite, but it rings true as advice for securing files that you’ve stored online. Several recent incidents—including breaches of Dropbox ...