Don't-Miss Stories

10 encrypt usb flash drive with truecrypt

TrueCrypt now encouraging users to use Microsoft's Bitlocker

The TrueCrypt Web page is now encouraging users to instead encrypt files using Microsoft's Bitlocker technology, because of apparent security issues. Is TrueCrypt dead?

facebook

Here's how to chat with your Facebook friends using end-to-end encryption

Cryptocat can now pull a person's buddy list from Facebook

heartbleed 100260998 orig

One month later, hundreds of thousands of servers still vulnerable to Heartbleed

About a month after the OpenSSL Heartbleed bug surfaced, a large number of servers worldwide are still vulnerable to attack.

Mozilla to strengthen SSL certificate verification in Firefox

The software maker will pay US$10,000 for any critical vulnerability found in its new certificate verification code

gmail logo

Google reportedly wants to make email encryption easier, but don't hold your breath

Email encryption is a great way to keep snoops out of your private correspondence. Too bad it's not a realistic option as a built-in feature for Gmail.

encrypting lead image

Why, and how, to encrypt your Android device

We know the days of digital privacy are long gone. You can start to claw a smattering of it back by encrypting your Android phone or tablet.

on greenbot.com

heartbleed 100260998 orig

Teen arrested for Heartbleed attack against Canadian tax site

The Canada Revenue Agency reported data on 900 taxpayers was stolen through the Web vulnerability

Lavaboom builds encrypted webmail service to resist snooping

The service, inspired by the now-defunct Lavabit, has started accepting registrations for its upcoming beta testing period.

leavenotrace primary

Leave no trace: Tips to cover your digital footprint and reclaim your privacy

Reduce your exposure to spying eyes with sandboxing, disk encryption and more.

TrueCrypt for Windows: No major flaws found in first phase of security audit

The popular open-source encryption program has "no evidence of backdoors or intentional flaws" that could be exploited for surveillance.