Information Security News, Guides & Expert Analysis

Are you looking for a full disk encryption tool you can trust for Mac or Windows? We recommend six disk encryption tools.
By Paul Bischoff in Information Security on October 2, 2023
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By Josh Lake in Information Security on June 8, 2023
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By Josh Lake in Information Security on September 1, 2023
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By Josh Lake in Information Security on November 16, 2023
The Computer Fraud and Abuse Act (CFAA) is an important cybersecurity law. Discover more about the l
By Aimee O'Driscoll in Information Security on October 5, 2018
This article covers what AES encryption is, how and why it was developed and explains how it works. We also look at some security issues with AES encryption.
By Josh Lake in Information Security on October 27, 2023
The Houseparty video chat app is designed for young adults, but is especially popular among teens. P
By Sam Cook in Information Security on September 28, 2018
We sifted through half a dozen illicit goods marketplaces on the dark web to find out just how much
By Paul Bischoff in Information Security on November 15, 2018
We will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices. Choosing the best encryption mode is important for both security and the speeds on your device.
By Penny Hoelscher in Information Security on August 24, 2023
Page 37 of 43