Ensuring Your Emails Don’t Lead to A Major Information Leak
Headline Emails Lead To Data Breach Today we all use emails far more than we use letter writing to communicate with our friends and relatives. In business the use of email is ubiquitous, and seems to...
View ArticleTor – Your Online Anonymity
What is Tor? Is it even possible to use the Internet without your traffic be intercepted by malicious actors? I am not 100% sure, but perhaps it time revisit Tor. Tor, grew in popularity a few years...
View ArticleCovert Operations: Kill Chain Actions using Security Analytics
In Special Operations, there are multiple actors on either side of the battlefield, at any point in time, attempting to achieve tactical leverage over the enemy. This leverage comes in multiple forms,...
View ArticleWhy E-mail Can’t Be Completely Private
Posted by: David Talbot | Posted in: MIT Technology Review When Lavabit—an e-mail service used by National Security Agency leaker Edward Snowden—suspended service last week amid hints that it had...
View ArticleEncryption and Hidden Messages in Biology
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security...
View ArticleThe Imminent Demise of Bitcoin
Bitcoin started as a transparent open source currency that provided anonymity. It also provided advantages over traditional currency. Bitcoin is not bound to any organization or country. It is a...
View ArticleOpen Whisper Systems releases free open source Secure Messaging and Voice app
I have been waiting for almost a year for Open Whisper systems to release an iOS Apple compatible application for secure messaging. This is free, it’s open source, its easy to use. Download it now....
View ArticleProtonMail – Secure, Private, Encrypted Email
ProtonMail is an email service that was developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland. Their goal was simple:...
View ArticleUnderstanding Rainbow Tables
On the topic of breaking passwords, I often hear security professionals and a few other folks mention Rainbow Tables. I used to think a Rainbow Table was a set of pre-computed (pre-calculated) hashes...
View ArticleQ&A on Encryption with Aamir Lakhani
Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...
View ArticleQ&A on Encryption with Aamir Lakhani
Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...
View ArticleQ&A on Encryption with Aamir Lakhani
Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...
View ArticleQ&A on Encryption with Aamir Lakhani
Encryption remains a hotly debated topic of discussion in cybersecurity. Fortinet’s Aamir Lakhani offers some perspective on what customers think about encryption today and going forward. Why is...
View Article