News

You may think that encrypting your sensitive files with, say, PGP may protect your data - but you'd be wrong. Most encryption formats leak a lot of plaintext metadata, and that's a problem. Here's ...
PGP is based on the public-key encryption method, which uses two keys: One is a public key that the user disseminates to anyone from whom he wants to receive a message; the other is a private key ...
Getting the Message — The other parts of PGP Desktop Professional look and act pretty much the way they did in previous versions, but I wanted to point out two interesting things about PGP Messaging, ...
The encryption/decryption performance was average to slightly slower than other products I’ve tested, including Microsoft’s EFS (Encrypting File System), OpenPGP, TrueCrypt, and DataGuard.
PGP on Monday unveiled PGP NetShare, ... The encryption and decryption of the data is done on the user's computing device, not on the server, ...
PGP Corporation today announced a major update to PGP Whole Disk Encryption for Mac OS X. While Whole Disk Encryption was previously available for Macs, it only encrypted external volumes and didn ...
PGP runs into problems when it tries to encrypt or decrypt files that have names longer than 200 characters. When PGP attempts to decrypt the files, a buffer overflow causes it to crash.
Several versions of the popular PGP encryption software, which permits key escrow, have been found to include vulnerabilities that could expose encrypted data in e-mail. Topics Spotlight: AI-ready ...
Whooooooops!! If you use PGP encryption to protect your email, you might want to disable it for the time being. A team of European researchers have discovered vulnerabilities — they’re calling ...
You’ll know if you’re using PGP, because the entire premise of the program is based around using public and private keys—huge strings of text—to encrypt and decrypt messages.