Beware of PGP 'con job'

The recently announced security flaw in PGP (Pretty Good Privacy), the popular e-mail encryption software, relies more on social engineering than a glitch in the actual technology. It won't wreak havoc unless a user is tricked into hitting the reply button. Even at that, most messages sent using PGP are not affected, said Jonathan Callas, a SearchSecurity site expert and the principal author of the OpenPGP standard. SearchSecurity news writer Edward Hurley spoke with Callas about the flaw and how it affects users.

This Content Component encountered an error

Dig Deeper on Disk Encryption and File Encryption

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close