| Similar Articles |
 |
New Architect January 2003 Thomas Claburn |
Pretty Good Isn't Good Enough Phil Zimmermann, creator of PGP (Pretty Good Privacy) encryption, won the crypto war. Whither privacy?  |
Salon.com March 27, 2002 Bill Lamb |
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver?  |
PC World July 22, 2002 Deborah Radcliff |
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear.  |
Macworld August 15, 2005 Glenn Fleishman |
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive.  |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer.  |
PC Magazine August 31, 2005 Ryan Naraine |
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications.  |
Bank Systems & Technology June 26, 2009 Maria Bruno-Britz |
IBM Develops Technique to Enable Confidential Processing of Encrypted Data Homomorphic encryption will allow for the analysis of private data by third parties without revealing the data's content.  |
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes  |
Macworld April 2003 Glenn Fleishman |
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them.  |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day.  |
PC Magazine December 21, 2007 Erik Rhey |
Security's High Roller Once a top security consultant to Vegas casinos, Jeff Jonas is now head of IBM's Entity Analytic Solutions lab, figuring out ways to collect and store more data safely.  |
InternetNews May 10, 2005 Michael Singer |
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products.  |
PC World September 2005 Andrew Brandt |
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data.  |
InternetNews June 25, 2009 Alex Goldman |
IBM Claims Privacy Breakthrough for Cloud, Data Researcher Craig Gentry claims to have developed a new method for manipulating encrypted data - with major implications for data security, antispam efforts and cloud computing.  |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone.  |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality.  |
PC World February 10, 2003 Kyle Stock |
Feds Look to Expand Electronic Surveillance Confidential proposal calls for increased monitoring of private e-mail messages, Web surfing, and other online activities.  |
Searcher August 2000 Josh Duberman & Michael Beaudet |
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area.  |
InternetNews April 29, 2005 Michael Singer |
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them.  |
Linux Journal September 2001 Mick Bauer |
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG...  |
Reason June 2004 Julian Sanchez |
Soundbite: Probing Privacy An interview with the author of The Naked Crowd on the uncharted terrain that is privacy policy in America's digital age.  |
PC World September 11, 2002 Andrew Brandt |
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances.  |
BusinessWeek August 8, 2005 |
Surveillance Society: The Experts Speak Excerpts from those conversations with privacy and security experts about how much security monitoring is necessary and what can be done to prevent abuses.  |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce.  |
Salon.com September 14, 2001 Katharine Mieszkowski |
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much?  |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be.  |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run.  |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy.  |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe.  |
InternetNews February 22, 2006 Roy Mark |
Tech Inadvertently Helps Spy Game A new report claims that popular services such as Webmail are eroding U.S. privacy laws.  |
InternetNews April 2, 2007 Andy Patrizio |
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability.  |
Reason November 2003 Wendy M. Grossman |
The Spam Wars How should the Internet deal with junk mail?  |
PC Magazine February 17, 2004 Cade Metz |
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive.  |
Entrepreneur November 2004 Liane Cassavoy |
Hot Disks 11/04 Pain-Free Patching... Spam Stopper... Get Organized... Share Safely...  |
InternetNews May 25, 2010 |
Google Tests Encrypted Search The beta of Google's encrypted search site is available for users to try out. Will it prove to be more useful with the popularity of mobile Internet use?  |
Reason April 2009 Katherine Mangu-Ward |
State of Insecurity Interview with Bruce Schneier, the go-to guy for fresh ideas about all kinds of digital and physical security issues.  |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it.  |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads...  |
PC World September 2002 Andrew Brandt |
Privacy Watch: Just Say 'No' to Spam -- Again Sudden changes in some Web sites' policies can open the doors to spam.  |
Entrepreneur July 2004 Catherine Seda |
Spam Uncanned Is the Can-Spam legislation reducing unsolicited e-mail? Not according to a February 2004 survey by the Pew Internet & American Life Project.  |
Popular Mechanics October 20, 2008 John Brownlee |
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits.  |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties...  |
Popular Mechanics July 2008 Joel Johnson |
How to Stop Your Boss From Spying on Your Company E-mail Want to keep the IT guys from casually snooping on your dinner plans? Here are a few ways to beef up your in-office digital privacy.  |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists.  |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ....  |
InternetNews June 23, 2006 Ed Sutherland |
AT&T Draws Ire Over Privacy Update Privacy policy clarifications come as AT&T heads back into court.  |
InternetNews June 11, 2004 Susan Kuchinskas |
Microsoft Building 'Safer Search' Microsoft is working on creating "safer search" technology as it puts the finishing touches on refinements to Internet Explorer.  |
Technology Research News September 19, 2005 |
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals.  |
PC World January 31, 2002 Jim Welp |
Spam Begone Eating more spam than ever? Here's how to keep junk e-mail from ruling your in-box...  |
Reason April 2001 Jennifer DePalma |
Surfing Secrets The meanings of online privacy are multiple, and few authors present the facts and lay out the issues in a way that lets laypeople develop an informed opinion. Charles Jennings and Lori Fena's The Hundredth Window is, for the most part, an exception...  |