Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Hacking
ransomware
Bitcoin
Darknet
Vulnerabilities
visa
Posts Tagged ‘encrypted email’
Most Recent
 
Read More
August 20, 2015

ProtonMail Goes Open Source, Launches Mobile Apps

ProtonMail released version 2.0 of its encrypted email service and announced that ProtonMail is now open source. The ProtonMail apps for iOS and Android are scheduled for release later today.

25530
 
Read More
March 18, 2015

Yahoo Demos Password-Free Logins and End-To-Encrypted Email

It’s no secret that governments around the world are doing their best to snoop on civilian communications. Intelligence organisations like the NSA and CIA have tried everything, from infecting hard drive firmware to targeting popular mobile devices. Since Edward Snowden’s reports about government surveillance, technology companies have started boosting privacy measures to protect users and regain their trust. 

62383
 
Read More
January 8, 2015

Encrypted Email Goes Mobile With Tutanota

One of the problems mentioned in Making Encrypted Email Usable is the disconnect between the desktop, where there are PGP encryption applications or browser plugins, and the mobile world, where puzzle-box software leaves users feeling frazzled rather than freed.

66160
 
Read More
December 13, 2014

Making Encrypted Email Usable

When Edward Snowden reached out to Glenn Greenwald and Laura Poitras he insisted they use specific encryption methods. The two journalists required quite a bit of assistance from Micah Lee in order to communicate safely using Pretty Good Privacy, an email encryption standard which has been around twenty years.

The dance required is simply too complex for the average user, who doesn’t want cryptography; they just want to communicate safely. @SwiftOnSecurity, Twitter’s self appointed Information Security Thought Princess, recently summed up the issues in a single tweet.

But I’m Using SSL to Read my Encrypted Email

@SwiftOnSecurity [...]

14767
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University