Tag: Digital Signatures
-
What Are the Security Benefits of Using a Digital Signature?
In our digital age, it’s now become commonplace to sign documents online using what is known as a digital signature. This is an …
-
Digital Signature Spoofing Flaws Uncovered in OpenOffice and LibreOffice
The maintainers of LibreOffice and OpenOffice have shipped security updates to their productivity software to remediate multiple …
-
Digital Signatures Using Java
This is the ninth entry in blog series on using Java Cryptography securely. We started off by looking at the basics of Java Cryptography …
-
How to verify AWS KMS asymmetric key signatures locally with OpenSSL
In this post, I demonstrate a sample workflow for generating a digital signature within AWS Key Management Service (KMS) and then verifying …
-
Digital Signature in Java
1. Overview In this tutorial, we’re going to learn about the Digital Signature mechanism and how we can implement it using the Java …
-
The Positive Side Effects of Blockchain
Blockchain is a relatively niche technology at the moment, and even thought there’s a lot of hype, its applicability is limited. I’ve …
-
WordPress updates are digitally signed at last!
WordPress 5.2 is out and brings a number of functional improvements, but the great news for those who are worried about the security of …
-
Mozilla bug throws Tor Browser users into chaos
Update. Shortly ater publishing this article we were able to fetch Firefox 66.0.4, which claims to fix this issue by repairing a broken …
-
Top 10 Best Preventive Methods to Secure Email Accounts from Email Hackers
Secure Email Accounts is one of the most important concerns in the digital world since the email account is one of the most targetted …
-
A Guide to Blockchain Immutability and Challenges
There are thousands of tales spread throughout the world about blockchain. It is true that this technology is premier among …
-
Encryption and Signing
Symmetric Encryption Symmetric encryption means that the same key is used to encrypt and decrypt: Public Key Infrastructure (PKI) …
●●●