How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘encrypted email’
Most Recent
Read More
August 20, 2015

ProtonMail Goes Open Source, Launches Mobile Apps

ProtonMail released version 2.0 of its encrypted email service and announced that ProtonMail is now open source. The ProtonMail apps for iOS and Android are scheduled for release later today.

Read More
March 18, 2015

Yahoo Demos Password-Free Logins and End-To-Encrypted Email

It’s no secret that governments around the world are doing their best to snoop on civilian communications. Intelligence organisations like the NSA and CIA have tried everything, from infecting hard drive firmware to targeting popular mobile devices. Since Edward Snowden’s reports about government surveillance, technology companies have started boosting privacy measures to protect users and regain their trust. 

Read More
January 8, 2015

Encrypted Email Goes Mobile With Tutanota

One of the problems mentioned in Making Encrypted Email Usable is the disconnect between the desktop, where there are PGP encryption applications or browser plugins, and the mobile world, where puzzle-box software leaves users feeling frazzled rather than freed.

Read More
December 13, 2014

Making Encrypted Email Usable

When Edward Snowden reached out to Glenn Greenwald and Laura Poitras he insisted they use specific encryption methods. The two journalists required quite a bit of assistance from Micah Lee in order to communicate safely using Pretty Good Privacy, an email encryption standard which has been around twenty years.

The dance required is simply too complex for the average user, who doesn’t want cryptography; they just want to communicate safely. @SwiftOnSecurity, Twitter’s self appointed Information Security Thought Princess, recently summed up the issues in a single tweet.

But I’m Using SSL to Read my Encrypted Email

@SwiftOnSecurity [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University