48 Results for:PGP

  • Sort by: 

OpenTofu forges on with beta feature that drew HashiCorp ire

By Beth Pariseau 19 Apr 2024

Defying a HashiCorp cease and desist, OpenTofu 1.7 beta ships with the removed blocks feature and client-side state encryption support long sought by the Terraform community. Read More

PGP keys: Can accidental exposures be mitigated?

By Matthew Pascucci 04 Dec 2017

The accidental publication of an Adobe private key could have put the company in jeopardy. Matt Pascucci explains how it happened and how to better protect PGP keys. Read More

Efail flaws highlight risky implementations of PGP and S/MIME

By Michael Heller 14 May 2018

The messy disclosure of the Efail flaws raised questions about the security of email encryption, while experts said S/MIME may be more at risk than some PGP implementations. Read More

Security experts: Investigatory powers plans will delay security updates

By Bill Goodwin 14 Feb 2024

Cyber security experts warn that government proposals to amend the Investigatory Powers Act will limit tech companies’ ability to respond to security threats and could hamper the use of end-to-end encryption Read More

What are the most important email security protocols?

By Peter Loshin 13 Oct 2023

Email was designed without security considerations. Email security protocols, including SMPTS, SPF and S/MIME, add mechanisms to keep messaging safe from threats. Read More

Fancy Bear targets Nato entities via critical Outlook flaw

By Alex Scroxton 08 Dec 2023

A vulnerability patched in March has likely been exploited by the Russian state actor Fancy Bear, for over two years, according to the latest intelligence Read More

Risk & Repeat: Breaking down the Efail flaws

By Rob Wright 24 May 2018

In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Efail vulnerabilities in PGP and S/Mime protocols, as well as the rocky disclosure process for the flaws. Read More

Forensic Institute provides Hansken viewing method for Dutch lawyers

12 Jul 2023

Dutch lawyers can now view crypto communication in criminal cases from their own workplace via digital search engine Hansken. Previously, this had to be done at an external location Read More

Dutch lawyers raise human rights concerns over hacked cryptophone data

By Bill Goodwin 25 Oct 2022

Dutch defence lawyers say in an open letter that there is a risk of unfair trials unless they are allowed to test the reliability and legitimacy of hacked cryptophone evidence Read More

How DKIM records reduce email spoofing, phishing and spam

By Peter Loshin 20 Sep 2022

Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Read More