48 Results for:PGP

  • Sort by: 

How to send secure email attachments

By Michael Heller, Michael Cobb 05 Aug 2020

Sending sensitive information in attachments is inherently unsafe, and the main way to secure them -- encryption -- can be implemented inconsistently, negating security benefits. Read More

Security Think Tank: Responsible vulnerability disclosure is a joint effort

By Paddy Francis 06 Oct 2021

By working hand-in-hand, developers and security researchers can both play a vital role in ensuring newly-discovered vulnerabilities are addressed appropriately, writes Paddy Francis of Airbus CyberSecurity Read More

Efail disclosure troubles highlight branded vulnerability issues

By Michael Heller 16 May 2018

The Efail disclosure process was one day away from completion, but attempts to generate hype for the vulnerabilities led to details leaking earlier than researchers intended. Read More

No need to panic about Efail attacks

By Warwick Ashford 15 May 2018

Initial reports about vulnerabilities in email encryption technologies have urged organisations to disable encryption tools, but some security experts are taking a more balanced approach Read More

Pandora Papers: How journalists mined terabytes of offshore data to expose the world’s elites

By Bill Goodwin 02 Dec 2021

Six hundred journalists spent over a year mining 2.94 terabytes of data that revealed offshore companies and the politicians, world leaders and celebrities who secretly owned them Read More

Jon Callas

Jon Callas is an inventor, cryptographer, software engineer, and entrepreneur.Read More

Black Hat 2007: VoIP security reaches tipping point

By Bill Brenner 01 Aug 2007

VoIP security is as bad today as it was a couple years ago, industry experts say. But PGP creator Phil Zimmermann thinks his new Zfone software will help turn the tide. Read More

Amazon Ring video doorbell flaw left users open to attack

By Alex Scroxton 07 Nov 2019

A vulnerability in Amazon’s Ring video doorbells left the internet-of-things devices open to a variety of attacks Read More

Comparing Diffie-Hellman vs. RSA key exchange algorithms

By Sharon Shea, Michael Cobb 20 Nov 2019

See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Read More

Iranian cyber espionage highlights human element

By Warwick Ashford 14 Dec 2018

State-backed hackers in Iran have reportedly upped efforts to compromise US officials’ email accounts using phishing scams Read More