MUO

Encryption

Page 7

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
encryption 1
Cryptology vs. Cryptography: What's the Difference?

Crypto this and crypto that, it's all the same, right? That's where you're wrong: cryptology and cryptography are different, and here's why.

By 
what are encrypted messaging apps 1
What Are Encrypted Messaging Apps? Are They Really Safe?

Apps like Facebook Messenger, WhatsApp, and Telegram send encrypted messages. But what does this mean? Can you trust them?

By 
microsoft hacking laptop feature 1
3 Ways to Decrypt Files and Folders on Windows 10

Learn the best methods to decrypt your files and folders on Windows 10.

By 
Messenger end-to-end encryption 1
Facebook to Launch End-to-End Encryption for Messenger Calls and Instagram DMs

Facebook is making video and voice calls more secure on Messenger.

By 
 1
How to Use the Windows Command Prompt to Encrypt Files

You don't need fancy software to encrypt files, as the Windows Command Prompt can do it all for you. Here's how.

By 
 1
How Do Websites Keep Your Passwords Secure?

With so many online security breaches these days, you might be concerned about how websites store your passwords.

By 
Photo of VPN network showing on computer screen 1
What Is a No-Log VPN?

With so many VPNs on the market these days, knowing which to choose is hard. Here's why no-log VPNs are worth considering.

By 
An anonymous person 1
Microsoft Teams Is Getting a Much-Needed Privacy Tool

Soon, all of your calls will use end-to-end encryption to keep prying eyes out.

By 
image of a blue-haired woman standing in the dark with numbers and codes projected onto her face 1
Who Are the Cypherpunks And What Are They Advocating For?

They sound like a futuristic group of visionaries, and in some ways, they are.

By 
 1
Telegram Is a Hub for Illegal Activity, Says Norton

The security company showed screenshots of criminals selling wares over Telegram, from fake goods to cyber warfare tools.

By 
tor logo browser feature 1
Over 25 Percent of Tor Exit Nodes Could Be Spying on Your Data

A malicious party is using the exit nodes to spy on users, and more.

By 
 1
Does HTTPS Protect Data in Transit?

What makes HTTPS, the secure version of the internet protocol, so safe? Does it really look after your personal info?

By 
lock and binary code 1
How to Send Encrypted Email With 5 Popular Mail Services

Not all email services are created equal — read on to find out which popular email services support encryption to keep your mail safe and secure.

By 
emails being sent 1
How to Send Encrypted Emails to Anyone with ProtonMail

Concerned your emails are not secure enough? Here's what you need to know about sending encrypted emails with ProtonMail.

By 
lock encryption feature 1
What Does Encrypted Mean and Is My Data Secure?

You'll have heard the term "encrypted" used a lot, but what is data encryption, and what does it do to your information?

By 
Magnifying glass held up to mailbox icons on computer screen 1
The 8 Best ProtonMail Alternatives for Your Email Security

ProtonMail is an extremely secure email service, but it doesn't appeal to all users, so here are a few alternatives.

By 
sigstore feature 1
The Linux Foundation Launches sigstore, a New Software Signing Service

It's going to become much easier to protect your shared software development files.

By 
WhatsApp will let you encrypt cloud backups 1
WhatsApp May Soon Start Encrypting Your Cloud Backups

Your WhatsApp chat backups uploaded to the cloud will soon be encrypted so your data remains secure.

By 
Security logo 1
What Is a Trusted Platform Module (TPM)?

Your computer has an extra security feature, but how does it work?

By 
Illustration of gears locks and a finger print 1
What Apps Use End to End Encryption to Improve Online Privacy?

Want to know if the apps you use support end-to-end encryption? If they do, you'll find them here.

By 
5 6 7 8 9
Page 7 / 17