In a move influenced by Edward Snowden's revelations about the NSA's email snooping, Yahoo and Google last week announced that they were cooperating on end-to-end encrypting their webmail products. "We will release source code this fall so that the open source community can help us refine the experi...
Yahoo and Google last week announced they'd be teaming up to secure their Web mail systems with encryption by the end of next year. "Our goal is to make end-to-end encryption fully available in 2015," Yahoo Vice President of Information Security Alex Stamos said at the Black Hat hackers' conference ...
Google this week released the alpha version of source code for End-to-End, a Chrome browser extension that encrypts email. End-to-End uses the OpenPGP standard to encrypt, decrypt, digitally sign and verify signed messages within the browser. "We're just sharing the code today so that the community ...
The death of online privacy had already been proclaimed long before Edward Snowden landed in the international spotlight, but if it wasn't confirmed back then, Snowden's NSA revelations surely must have extinguished the last vestiges of hope in even the most die-hard optimists. "We're in a predicame...
Some years ago, an antinuclear activist named Phil Zimmermann created a data encryption program for computers. He designed a key-generation and encryption-and-decryption system called "PGP," or Pretty Good Privacy, for the bulletin board systems that were the precursors to forums, email and the Web....
The Tibetan government, law firms in Thailand and human rights groups in Sudan are all using a relatively new encrypted communications tool -- one that fits easily, if not cheaply, onto your smartphone. Silent Circle is an encrypted voice, video, text and file-transfer protocol that's available in a...
News that the U.S. National Security Agency has worked steadily for at least the past decade to systematically undermine security has sparked an uproar on the Internet. The agency -- whose motto is "Defending Our Nation. Securing the Future" -- reportedly has circumvented or cracked much of the en...
It wasn't long after the Internet came into widespread use that online privacy became a growing concern. After all, anytime people are connected through their computers and sharing resources online, there's the potential for prying and abuse. Such concerns were compounded with the arrival of social ...
Symantec has determined that combining the newest version of its antivirus software with the decade-old Windows XP operating system can cause users' PCs to freeze up with the dreaded Blue Screen of Death. After Symantec analyzed the problem, it revealed that the incompatibility hit machines running ...
Public key cryptography, a system used to secure online traffic, carries a significant flaw, a group of European and American mathematicians and cryptographers has found. Public key cryptography requires the sender and the receiver of a message to each have a digital key to encrypt and decrypt it, r...
Always - To avoid potential risks
Sometimes - Depends on the QR code use in context
Never - I'm not concerned about QR code security risks
I'm not familiar with QR codes
Enter your Username and Password to sign in.