The Hacker News — Most Popular Cyber Security, Hacking News Site: file encryption software

GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature

GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature

June 14, 2018Swati Khandelwal
A security researcher has discovered a critical vulnerability in some of the world's most popular and widely used email encryption cl...
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits

Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits

April 08, 2017Mohit Kumar
Remember The Shadow Brokers ? They are back. A hackers group that previously claimed to have stolen a bunch of hacking tools (malware,...
VeraCrypt Audit Reveals Critical Security Flaws — Update Now

VeraCrypt Audit Reveals Critical Security Flaws — Update Now

October 18, 2016Mohit Kumar
After TrueCrypt mysteriously discontinued its service, VeraCrypt became the most popular open source disk encryption software used by a...
Searching for Best Encryption Tools? Hackers are Spreading Malware Through Fake Software

Searching for Best Encryption Tools? Hackers are Spreading Malware Through Fake Software

October 11, 2016Swati Khandelwal
Over the past few years, Internet users globally have grown increasingly aware of online privacy and security issues due to mass monitori...
Someone is Spying on Researchers Behind VeraCrypt Security Audit

Someone is Spying on Researchers Behind VeraCrypt Security Audit

August 16, 2016Mohit Kumar
After TrueCrypt mysteriously discontinued itself, VeraCrypt became the most popular open source disk encryption software used by activis...
How to decrypt Petya Ransomware for Free

How to decrypt Petya Ransomware for Free

April 12, 2016Mohit Kumar
Ransomware has risen dramatically since last few years and is currently one of the most popular threats on the Internet. The Ransom...
Free Ransomware Decryption Tool — CoinVault and Bitcryptor

Free Ransomware Decryption Tool — CoinVault and Bitcryptor

October 30, 2015Swati Khandelwal
Have you been infected with the insidious CoinVault or Bitcryptor ransomware? If so, there is some potentially good news for you. ...
Encryption Software VeraCrypt 1.12 Adds New PIM Feature To Boost Password Security

Encryption Software VeraCrypt 1.12 Adds New PIM Feature To Boost Password Security

August 11, 2015Swati Khandelwal
Encrypting your sensitive data is important. As you may know, CIA... C onfidentiality I ntegrity A vailability ...are the essenti...
How To Encrypt Your USB Drive to Protect Data

How To Encrypt Your USB Drive to Protect Data

June 15, 2015Mohit Kumar
The USB flash drives or memory sticks are an excellent way to store and carry data and applications for access on any system you come across...
How to Share Sensitive Files Instantly and Securely

How to Share Sensitive Files Instantly and Securely

May 12, 2015Mohit Kumar
Last week, I have to communicate with my friend overseas in China. We both were aware that our email communications were being monitored...
TrueCrypt Security Audit Concludes No NSA Backdoor

TrueCrypt Security Audit Concludes No NSA Backdoor

April 02, 2015Swati Khandelwal
The Security audit of TrueCrypt disk-encryption software has been completed, with no evidence of any critical design vulnerabilities or...