Language selection

Blog

Privacy Tech-Know Blog: Secret Agent 101— Basics of Cryptography

Privacy Tech-Know Blog: Secret Agent 101— Basics of Cryptography

Individuals and organizations have long had a need to protect secrets from prying eyes. One way in which we protect those secrets is through the use of cryptography, from the Greek kryptós, meaning "hidden” or “secret" and graphein, meaning "writing".  Early forms of cryptography were used by the ancient Egyptians, Greeks and Romans.

Read more

Privacy Tech-Know Blog - Your Identity: Ways services can robustly authenticate you

Privacy Tech-Know Blog - Your Identity: Ways services can robustly authenticate you

Traditionally, we have logged into online systems using a username and password. These credentials are often being compromised, however, when databases containing them are breached or we are tricked into providing the information to fraudulent individuals or websites (often through phishing or other social engineering attacks). Once these credentials are compromised, attackers can use them to log into the associated online services. Even worse, because people often reuse their usernames and passwords, the attackers can access multiple services.

Read more

Showing items 1 through 10 of 31.

Report a problem or mistake on this page
Error 1: No selection was made. You must choose at least 1 answer.
Please select all that apply (required):

Note

Date modified: