Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. Read now Most ...
A federal judge has ordered a criminal defendant to decrypt his hard drive by typing in his PGP passphrase so prosecutors can view the unencrypted files, a ruling that raises serious concerns about ...
For this smartphone security Rolling Review installment, we take a close look at PGP Mobile 9.9.0, part of PGP's PGP Encryption Platform. This suite of products does an impressive job of encrypting ...
About a year and a half ago, I reviewed the initial release of PGP Whole Disk Encryption (WDE) for Mac (see “Securing Your Disk with PGP Whole Disk Encryption,” 31 October 2008). At the time, this ...
Whooooooops!! If you use PGP encryption to protect your email, you might want to disable it for the time being. A team of European researchers have discovered vulnerabilities — they’re calling them ...
I’ve been using various incarnations of PGP (Pretty Good Privacy) encryption software for almost as long as I’ve been a Mac user. I won’t go into PGP’s long ...
Although I’ve yet to see the one product that can encrypt data on all OSes and media, PGP’s suite of encryption products offers a competitive enterprise solution to protect a variety of content on ...
GnuPG, the open replacement for PGP, is an excellent tool to manage cryptographic signatures to files or e-mails for validity and integrity, as well as a tool to encrypt and decrypt sensitive files.
In our last episode of Private I, I explained the basics of public-key (PK) cryptography, a way to scramble messages in a way that only someone possessing a particular key can decrypt, without that ...