Don't-Miss Stories

NIST denies NSA tampering with encryption standards

The U.S. National Institute of Standards and Technology (NIST) has vigorously denied that the U.S. National Security Agency (NSA) tampered with NIST's process of vetting and choosing encryption algorithms.

Encryption still protects data, even from NSA, experts say

Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.

Here's how to best secure your data now that the NSA can crack almost any encryption

New reports suggest the NSA is capable of cracking many of the encryption protocols being used today. Here are tools that minimize that risk.

Report: NSA defeats many encryption efforts

The NSA has cracked much of the encryption that protects global commerce, banking, trade secrets, and medical records, according to the report, which cites documents leaked by former NSA contractor Edward Snowden

IDriveSync share

Review: IDriveSync secures cloud storage

IDriveSync is an easy-to-use cloud storage and syncing solution that offers added security missing from some of its rivals. It offers both AES 256-bit and private key encryption, which will appeal to anyone who's weary of weak cloud-based security.

Snowden's email provider, Lavabit, shutters citing legal pressure

An email provider reportedly used by former NSA contractor Edward Snowden shut down on Thursday, citing an ongoing court battle that it could not discuss.

Open-source project, Crypton, seeks to make encryption easier

An open-source software project aims to give software developers a simple way to wrap encryption into their applications to thwart online surveillance efforts.

spying privacy surveillance

How to run your own private PRISM program like the NSA

Why should the NSA have all the surveillance fun? Its PRISM spy software is built into a wide variety of tools available to everybody.

Encryption can’t protect your data while you’re logged in

If you don't use a password to unlock your computer, smartphone, or tablet, most encryption software won't protect your private or proprietary data if the device is lost or stolen.

Five essential security measures to protect your business—no matter its size

Take these basic steps to safeguard your business's invaluable information assets.