News

Armis, the cyber exposure management & security company, today announced that PGP Glass Private Limited is leveraging ...
Establishing a backup system is a necessary first step, but it is only effective if you regularly test and verify it. Do not assume that automated processes will always deliver as expected. Instead, ...
Between PGP and other pressures, the government eventually left everyone’s crypto alone. Fortunately, the government has mostly refrained attempting to legislate dilutions of encryption, at least ...
Two researchers are being singled out in what are called PGP poising or flood attacks that render the authentication tool unusable for victims.
Encryption commands such as gpg can be used to secure your most sensitive files on Linux systems.
ProtonMail is arguably the easiest way to send end-to-end encrypted emails. But encryption only works by default with other ProtonMail users. The company is adding full PGP support so that you can ...
ProtonMail has been updated on desktop and on mobile to include support for address verification and PGP. With PGP, ProtonMail users can securely email non-ProtonMail users if they, too, use PGP.
You may think that encrypting your sensitive files with, say, PGP may protect your data - but you'd be wrong. Most encryption formats leak a lot of plaintext metadata, and that's a problem. Here's ...
Philip Zimmermann, the inventor of the PGP encryption system he designed in the early 1990s, has joined the StartPage search engine, which allows people to privately search Google results.
The man credited with inventing PGP has teamed up with other key developers to assure users that the popular encryption program is not insecure, despite some reports to the contrary earlier this month ...