Trend Results : Let's Encrypt

Blog Post Results (1-20 of 283)


How to secure your website

You no longer have a choice about locking down your website. Google will mark all non-HTTPS sites as insecure this July. It's time to lock your site down, and Let's Encrypt gives you a free and easy way to do it.

Chrome browser will soon mark all HTTP pages as 'Not secure', because they aren't

Google wants you to know which websites are safe and which aren't. Google wants to rid the web of sites not protected by HTTPS encryption, and it has told us how it is going to do its part to let everyone know that "regular" HTTP sites...Show More Summary

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

Vulnerabilities let people see your Tinder swipes and photos - CNET

Think twice about using Tinder on public Wi-Fi. A security firm says the dating app uses insecure encryption that could let hackers snoop on your activity.

How to install Let's Encrypt and automate renewal in Nginx

Do you want to secure your nginx server? Do you want to prevent Google Chrome from name shaming your non-SSL domain? Well, here a perfect yet easy to follow guide to help you.

Skype Tests End-To-End Encryption With ‘Private Conversations’

Skype is finally implementing end-to-end encryption with new Private Conversations. Using Open Whisper Systems’ Signal Protocol, the feature lets users conduct audio calls and send text messages or files without fear of prying […] The post Skype Tests End-To-End Encryption With ‘Private Conversations’ appeared first on

Researchers say a WhatsApp security flaw let them snoop on group chat messages

A team of German cryptographers say they have found a flaw in WhatsApp’s security that allowed them to bypass the chat app’s end-to-end encryption and eavesdrop on group chat messages. The team, which hails from Ruhr University Bochum...Show More Summary

Let's Encrypt disables TLS-SNI-01 validation

It is possible to exploit the protocol to obtain certificates for domains you do not own.

WhatsApp Security Flaw Lets Someone Covertly Add Members To Group Chats

A team of crytopgraphers from Germany's Ruhr University Bochum say they have uncovered flaws in WhatsApp's security that could limit the benefits of the messaging service's vaunted end-to-end encryption in group chats. More »      

Trump team talked about letting Flynn use Signal app

2 months agoNews : The Raw Story

Last year, President Donald Trump’s transition team reportedly looked for ways for disgraced former National Security Adviser Michael Flynn to send encrypted messages during the transition and just prior to his conversations with the former Russian ambassador to the United States, according to...

Stay Protected Online with ZenMate Premium VPN: Lifetime Subscription at 92% Off

Do you wish to protect your privacy online? Used by over 41 million users, ZenMate lets you access the web securely, anonymously, and without restriction. It employs top-level encryption to keep your passwords and banking information safe, letting you browse the Web securely on any public or private WiFi connection. Show More Summary

Latest DOJ WTFness: Encryption Is Like A Locked House That Won't Let Its Owners Back Inside

3 months agoIndustries / Law : Techdirt

Deputy Attorney General Rod Rosenstein continues his push for law enforcement-friendly broken encryption. The ultimate goal is the same but the arguments just keep getting worse. Trying to pitch worthless encryption (i.e., encryption...Show More Summary

BlackBerry CEO Promises To Try To Break Customers' Encryption If The US Gov't Asks Him To

4 months agoIndustries / Law : Techdirt

The DOJ's reps -- along with the new FBI boss -- keep making noises about device encryption. They don't like it. What they want is some hybrid unicorn called "responsible encryption," which would keep bad guys out but let law enforcement in. Show More Summary

Smartcard Vulnerability Gives Hackers Open Door Access

A flaw in a widely used code library has undermined the security of millions of encryption keys used in national identity cards, code-signing, and other platforms protecting. The weakness lets bad actors calculate the private portion of a vulnerable key so they can impersonate key owners, decrypt data and sneak malicious code into signed software. More »      

WhatsApp lets users share their real-time locations

This week, messaging app WhatsApp announced a new feature that allows users to share their real-time location with family and friends. The feature is encrypted end to end to ensure users' privacy and security, and it allows you to control who can see your location and when they can see it. Show More Summary

KRACK Attack Hacks All Wi-Fi Networks: What to Do

4 months agoTechnology : Tom's Guide

A serious flaw threatens all Wi-Fi enabled devices, letting attackers snoop on encrypted traffic, stealing passwords and injecting malware.

The myth of responsible encryption: Experts say it can't work - CNET

4 months agoTechnology / Internet : Webware

Government officials call for a way to protect consumers while also letting law enforcement see criminal data. But some specialists say it's not possible.

The myth of responsible encryption: Experts say it can't work - CNET

4 months agoTechnology : CNET: News

Government officials call for a way to protect consumers while also letting law enforcement see criminal data. But some specialists say it's not possible.

Why We Should Never Let the Government Break Encryption

Several times a year, we face massive calls for a truly ridiculous notion: create government accessible encryption backdoors. There is constant background support from lawmakers and TLA government agencies. The calls are strongest when a terrorist atrocity kills innocent people. Show More Summary

How to use Let's Encrypt to secure your websites

Let's Encrypt is easy to use and free -- no wonder it's the most popular Certificate Authority for securing websites. Here's how you can use it.

Copyright © 2015 Regator, LLC