The government of India has scrapped a proposal for a new law on encryption that would have required all citizens to maintain a plain-text version of their encrypted ...
There’s been a steep rise in the number of data leak incidents. Many agencies are directly tapping into the servers of major internet companies to access users’ personal information without their ...
Why is Christian Science in our name? Our name is about honesty. The Monitor is owned by The Christian Science Church, and we’ve always been transparent about that. The Church publishes the Monitor ...
First, the bad news: the CyberVolk 2.x (aka VolkLocker) ransomware-as-a-service operation that launched in late summer. It's ...
Kleopatra is the GnuPG front-end program for Windows as a part of Gpg4win. And it's driving me nuts. The Linux program has a simple clipboard, and this makes sense to me. You have text to encrypt, or ...
Android smartphones, like other phones, send text messages in plain text. The text messages can be intercepted and read on the network. The text messages could also be read by anyone with access to ...
You probably use encryption, in one form or another, every day. You might not know that you are, but you are. And my guess is that you don’t give it a second thought. Do you have a subscription based ...
Mobile apps have replaced texting. Cloud storage have replaced pen drives. Hardly anything exists in the offline mode. Everything is online, interconnected and also increasingly prone to security ...
One of the most common problems identified by static code analysis tools is the presence of plain text passwords written directly into configuration files. It's ...