Skip to main content

The Latest

  • How VoIP Can Improve Security
    How VoIP Can Improve Security
    Voice over Internet Protocol (VoIP) phone systems are identical in terms of hardware to their traditional predecessors. They include the same microphone, receiver, and headset that standard phones use, though they differ in how they connect to...
  • Surfeasy protects your Online Privacy
    Surfeasy Helps Users Retain Online Privacy
    Toronto based start-up Surfeasy is dedicated to help user retain what is left of their privacy in the digital age. The company has created a web browsing tool that encrypts data so that it becomes meaningless to prying eyes, and the company says...
  • Heartbleed
    Catastrophic Heartbleed bug exposes 60% of private internet data
    Encryption technology is used to protect all sensitive information online, including passwords, usernames, and identification of secure websites. Heartbleed, identified late Monday night, is a bug in OpenSSL that has left two-thirds of all...
  • Removable Media Encryption
    Benefits of self encrypting drives for businesses
    In a provocative article on data encryption, the author wonders if self-encrypting drives cam prevent data breaches. The scale of the problem (267 million records containing sensitive information were compromised in 2012) would suggest that the...
  • Edward Snowden
    Watch as Edward Snowden speaks via seven proxy servers at SXSW conference
    As expected, Edward Snowden appeared at the SXSW conference on Monday, via several proxies and as reported byEngadget. He used a Google Hangout, which was passed through seven proxies.His entire talk is embedded. Snowden is, of course, still in...
  • Edward Snowden
    For better access, Edward Snowden snagged his supervisor's password: Report
    Former NSA contractor and whistleblower Edward Snowden used one of the oldest and easiest to circumvent vulnerabilities known when accessing NSA documents: a human being. NBCreportedthat Snowden managed to convince a civilian NSA employee -- who...
  • Real Data Encryption Software is More Important than Ever
    Real Data Encryption Software is More Important than Ever
    The NSA story keeps breaking, with the latest revelation that the NSA paid RSA, a subsidiary of EMC, with a deep history in computer and internet security to implement and sell faulty encryption technology to its own clients. The December 2013...
  • The Target Data Breach: A Wakeup Call
    The Target Data Breach: A Wakeup Call
    The recent data breach that targeted Target has many consumers concerned about sharing their personal information, and rightly so. The holiday hacking is reported to have endangered the data of more than 100 million Target customers. Not only were...
  • Encryption
    12 ways to hide online
    If you feel paranoid about online surveillance, there are ways you can significantly shrink your cyber presence so that it’s more difficult and expensive for anyone and even big intelligent agencies to monitor your online activities.1. End...
  • Why Choose a Network Security Solution When Your Computers Already Have Encryption Software?
    Why Choose a Network Security Solution When Your Computers Already Have Encrypti
    After discovering that the computers you've just purchased for your business come with encryption software built into the operating system, you may wonder how you're going to manage all those recovery keys and ensure that users don't...
  • Cryptolocker malware screen shot
    Beware of Cryptolocker
    One of the new insidious pieces of malware that is attacking individuals and firms currently is Cryptolocker. This is a new ransomware Trojan that encrypts your files and demands money to return them.The way it works is that users will get an e...
  • NSA
    Johns Hopkins forces cryptography professor to pull NSA-critical blog post
    A Johns Hopkins crytography professor was asked to remove a blog post of his, one which discussed in detail the recent revelations about the NSA and its ability to sidestep encryption. Although the post was authored last week, the revelation of...
  • NSA and GCHQ secretly break and install "backdoors" into online privacy encryption
    US, UK "security" agencies breach Internet encryption security
    The American National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ) have for years successfully undermined the privacy guarantees given by banks, financial institutions, retailers and health providers,...
  • Texas GPS spoofing: Researcher tricks $80 million yacht
    Texas GPS spoofing: Researcher tricks $80 million yacht
    A University of Texas GPS spoofing team tricked an $80 million super yacht. Todd Humphreys deceived the "White Rose Yacht" into going the wrong way on the Ionian Sea. According to United Press International on July 30, 2013, a $2,000 box...
  • Feds want web companies master encryption keys, user account passwords
    Feds want web companies master encryption keys, user account passwords
    While the U.S. House of Representatives on Wednesday defeated the Amash amendment that would have defunded the NSA’s massive data collection program, another amendment, the Pompeo amendment, by Republican Rep. Mike Pompeo of Kansas quietly...