Tags: encryption


Jack Wallen walks you through the process of encrypting and decrypting a file from within three popular Linux file managers.

How to Encrypt Files From Within a File Manager

The Linux desktop and server enjoys a remarkable level of security. That doesn’t mean, however, you should simply rest easy. You should always consider that your data is always a quick hack away from being compromised. That being said, you might want to employ various tools for encryption, such as...
Read 0 Comments

Six Cyber Threats to Really Worry About in 2018

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year. More huge data breaches The cyberattack on the Equifax credit reporting agency in 2017, which led to the theft of Social...
Read 0 Comments

Transport-Layer Encryption vs End-to-End Encryption

It’s also important for learners to be able to distinguish what the encryption they are using to protect their information does and does not protect against. One way to clarify this conversation is to point out two different types of encryption for their information in transit: transport-layer...
Read 0 Comments

Serious Flaw in WPA2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a...
Read 0 Comments

IBM's Plan to Encrypt Unthinkable Amounts of Sensitive Data

DATA BREACHES AND exposures all invite the same lament: if only the compromised data had been encrypted. Bad guys can only do so much with exfiltrated data, after all, if they can't read any of it. Now, IBM says it has a way to encrypt every level of a network, from applications to local databases...
Read 0 Comments

Encryption Technology in Your Code Impacts Export Requirements

US export laws require companies to declare what encryption technology is used in any software to be exported. The use of open source makes complying with these regulations a tricky process. US Export Requirements The regulations on US software exports come from the US Commerce Department’s Bureau...
Read 0 Comments


Let’s Encrypt
Jillian Karner, operations engineer at Let’s Encrypt, expounds on the project’s emphasis on automation.

Ops Engineer Explains Let’s Encrypt’s Automated TLS/SSL Certificate Issuance

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and...
Read 0 Comments


Dan Kohn CNCF
This week, Cloud Native Computing Foundation announced Google is donating gRPC, its high performance remote procedure call (RPC) framework, to the foundation. Here pictured: Dan Kohn, CNCF Executive Director, at Cloud Native Day 2016.

This Week in Open Source, CNCF Announces 6th Managed Project, Changes in OSS Accelerate SDN & More

This week in open source news, CNCF adds gRPC to list of existing projects, making it the sixth, and other stories. Keep reading to stay on top of your news this week! 1) The Linux Foundation's Cloud Native Computing Foundation (CNCF) announced it's adding gRPC open source protocol to list of...
Read 0 Comments

Linus Torvalds on SHA-1 and Git: 'The Sky Isn't Falling'

Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked. The real worry about Google showing SHA-1 encryption is crackable, as pointed out by Peter Gutmann, a cryptography expert at the at the University of Auckland, New Zealand, is "...
Read 0 Comments

EFF: Half of Web Traffic is Now Encrypted

Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. The rights organization noted the milestone was attributable to a number of efforts, including recent moves from major tech companies to implement HTTPS on their own properties. Over the years,...
Read 0 Comments


Click Here!