Tags: encryption

How to Use the gpg Command to Encrypt Linux Files

There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don't want to share with anyone, or be backed up to some variety of online storage where you'd prefer it be extra secure...
Read 0 Comments

New IEEE Position Statement Supports Strong Encryption

On 24 June, the IEEE Board of Directors adopted a position statement in support of strong encryption for confidentiality and data integrity.  The essence of the position is that: “IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and...
Read 0 Comments

Using the Command Line to Decrypt a Message on Linux

If you have disabled the PGP plugin from your mail client and saved a copy of an encrypted email to your desktop, this guide will help you read that message in as safe a way as possible given what we know about the vulnerability described by EFAIL. Note that the first three steps (opening the...
Read 1 Comments

lock-1920.jpg

lets encrypt
Unencrypted HTTP sessions are wide open to abuse; lock them down with Let's Encrypt.

Protect Your Websites with Let's Encrypt

Back in the bad old days, setting up basic HTTPS with a certificate authority cost as much as several hundred dollars per year, and the process was difficult and error-prone to set up. Now we have Let's Encrypt for free, and the whole thing takes just a few minutes. Why Encrypt? Why encrypt your...
Read 1 Comments

TLS 1.3 Is Approved: Here's How It Could Make the Entire Internet Safer

​The IETF has finally given the okay to the TLS 1.3 protocol, which will speed up secure connections and make snooping harder for attackers. TLS 1.3 has been approved for use, which will make all secure internet connections faster and safer. The security and speed improvements brought by TLS 1.3...
Read 0 Comments

encryption.jpg

encryption
Jack Wallen walks you through the process of encrypting and decrypting a file from within three popular Linux file managers.

How to Encrypt Files From Within a File Manager

The Linux desktop and server enjoys a remarkable level of security. That doesn’t mean, however, you should simply rest easy. You should always consider that your data is always a quick hack away from being compromised. That being said, you might want to employ various tools for encryption, such as...
Read 0 Comments

Six Cyber Threats to Really Worry About in 2018

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year. More huge data breaches The cyberattack on the Equifax credit reporting agency in 2017, which led to the theft of Social...
Read 0 Comments

Transport-Layer Encryption vs End-to-End Encryption

It’s also important for learners to be able to distinguish what the encryption they are using to protect their information does and does not protect against. One way to clarify this conversation is to point out two different types of encryption for their information in transit: transport-layer...
Read 0 Comments

Serious Flaw in WPA2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a...
Read 0 Comments

IBM's Plan to Encrypt Unthinkable Amounts of Sensitive Data

DATA BREACHES AND exposures all invite the same lament: if only the compromised data had been encrypted. Bad guys can only do so much with exfiltrated data, after all, if they can't read any of it. Now, IBM says it has a way to encrypt every level of a network, from applications to local databases...
Read 0 Comments

Pages

Click Here!