Security flaw found in Networks Associates' PGP

Messmer, Ellen
August 2000
Network World;08/28/2000, Vol. 17 Issue 35, p81
Trade Publication
Reports on European cryptographic researchers' discovery of a security flaw in the Unix and Microsoft Windows versions of Network Associates Inc.'s PGP encryption software that lets attackers decrypt and read messages of targeted victims. Versions in which the flaw can be found; Software's acceptance of additional decryption keys which are outside the signed part of the public key.


Related Articles

  • PGP 6.0: Pro Crypto Suite Gets Personal. Del Torto, Dave // PCWorld;Jan1999, Vol. 17 Issue 1, p76 

    Reviews Network Associates' PGP for Personal Privacy 6.0, a software program for file encryption and digital signatures. Features; Price; Company contact information. INSET: Quick Takes, by Yardena Arar.

  • PGP brings security to masses. McClure, Stuart // InfoWorld;10/05/98, Vol. 20 Issue 40, p44C 

    Highlights the security features of the PGP Enterprise Security 6.0 public key encryption software developed by Network Associates Inc. Comparison of security capabilities with Entrust Technologies' and VeriSign's PKI solutions; Ease of management; Transport Layer Security support; Computer...

  • NAI set to pitch Active Security Network. Kerstetter, Jim // PC Week;03/08/99, Vol. 16 Issue 10, p42 

    Reports on the plans of Network Associates Inc. (NAI) in 1999. Focus the company is placing on its Active Security Network; How Active Security will be integrated across several of NAI's products including its PGP encryption software.

  • NAI boosts Pretty Good Privacy pack. Nelson, Matthew // InfoWorld;05/10/99, Vol. 21 Issue 19, p12 

    Reports that Network Associates Inc. will release several features to be added to its Pretty Good Privacy (PGP) suite of encryption products at the 1999 NetWorld+Interop conference. Planned release of Versions 6.5 of both PGP Enterprise Security and PGP Command Line software products;...

  • Why a £75 outlay could have saved Nationwide £1,m. McKelvey, Charlie // Precision Marketing;2/23/2007, Vol. 19 Issue 9, p12 

    The article introduces encryption software as a solution to computer data leakage in Great Britain. The author claims that with the boom of computer technology, data thefts has been rampant , and needs action from the government. Due to information losses, some companies have experienced several...

  • Key recovery moves ahead. Moeller, Michael // PC Week;12/23/96, Vol. 13 Issue 51, p36 

    Reports on the decision by over 20 companies to join the Security Alliance initiative to develop a computer encryption program for documents and messages sent over computers. The Alliance's Key Recovery plan; A list of some of the companies that have joined; What companies are looking for.

  • Digest.  // PC Week;08/30/99, Vol. 16 Issue 35, p25 

    Relates news briefs regarding computers for August 1999. The release of sales figures from the first half of 1999 on groupware such as Microsoft Exchange and Lotus Notes; A theoretical device by Adi Shamir, co-creator of public-key algorithm, that could weaken RSA key computer security.

  • Encrypt your data. Bradley, Helen // Australian PC User;Aug2005, Vol. 17 Issue 8, p121 

    Shows how to secure data using the Paragon Encrypted Disk software. Significance of using an encrypted disk; Steps in creating a new encrypted disk.

  • No fear peer-to-peer. Warne, Dan // Australian Personal Computer;Oct2003, Vol. 23 Issue 10, p148 

    With the copyright police increasing its monitoring of popular file-sharing networks like KaZaA and eDonkey, savvy users are turning to WASTE, a new program that relies on file encryption and ad hoc networks of trusted members to escape prying eyes. What makes WASTE different from other...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics