Quantcast
Browsing all 13 articles
Browse latest View live

Ensuring Your Emails Don’t Lead to A Major Information Leak

Headline Emails Lead To Data Breach Today we all use emails far more than we use letter writing to communicate with our friends and relatives. In business the use of email is ubiquitous, and seems to...

View Article


Tor – Your Online Anonymity

What is Tor? Is it even possible to use the Internet without your traffic be intercepted by malicious actors?  I am not 100% sure, but perhaps it time revisit Tor. Tor, grew in popularity a few years...

View Article


Covert Operations: Kill Chain Actions using Security Analytics

In Special Operations, there are multiple actors on either side of the battlefield, at any point in time, attempting to achieve tactical leverage over the enemy. This leverage comes in multiple forms,...

View Article

Why E-mail Can’t Be Completely Private

Posted by: David Talbot | Posted in: MIT Technology Review When Lavabit—an e-mail service used by National Security Agency leaker Edward Snowden—suspended service last week amid hints that it had...

View Article

Encryption and Hidden Messages in Biology

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security...

View Article


The Imminent Demise of Bitcoin

Bitcoin started as a transparent open source currency that provided anonymity. It also provided advantages over traditional currency. Bitcoin is not bound to any organization or country. It is a...

View Article

Open Whisper Systems releases free open source Secure Messaging and Voice app

I have been waiting for almost a year for Open Whisper systems to release an iOS Apple compatible application for secure messaging. This is free, it’s open source, its easy to use. Download it now....

View Article

ProtonMail – Secure, Private, Encrypted Email

ProtonMail is an email service that was developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland. Their goal was simple:...

View Article


Understanding Rainbow Tables

On the topic of breaking passwords, I often hear security professionals and a few other folks mention Rainbow Tables. I used to think a Rainbow Table was a set of pre-computed (pre-calculated) hashes...

View Article


Q&A on Encryption with Aamir Lakhani

Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...

View Article

Q&A on Encryption with Aamir Lakhani

Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...

View Article

Q&A on Encryption with Aamir Lakhani

Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...

View Article

Q&A on Encryption with Aamir Lakhani

Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...

View Article

Browsing all 13 articles
Browse latest View live