Businesses have proprietary information such as customer lists that need protection. The easiest way to protect only a few critical files is to encrypt and decrypt them manually. Unix system come with ...
The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it’s a Chrome app that aims to make it easy to create and share single encrypted files with others ...
In short, ransomware uses an assortment of techniques to block access to the victim’s system or files, usually requiring payment of a ransom to regain access. Recently we have seen significantly ...
The cloud-storage service Mega's automatic file-encryption process does a great job of protecting Mega's business model, but isn't so good at protecting users' files. Subscribe to read this story ...
The media has been delivering a seemingly endless stream of reports of lost or stolen laptops, backup tapes, hard drives and servers from government and corporate facilities. These devices often ...
Putting sensitive data in email messages or cloud storage should give you the heebie-jeebies, but a good dose of cryptography can give you peace of mind. Pretty Good ...
Cryptography is an obscure discipline. Unless you're in big tech, a university or a research organization, you're unlikely to meet its practitioners. Even then, you might have to search to find them.
Kim Dotcom, like every smart founder of a startup in a crisis, is pivoting. Since his Mega empire of filesharing websites and financial assets were seized in an indictment over massive alleged ...