This is the number one factor that determines the security of your lifestyle.
Encryption refers to any process used to make sensitive data more secure and less likely to be intercepted by those unauthorized to view it. That includes Password Managers [KeePass], encrypting your files or partitions [VeraCrypt] and your sms messages [Signal]. Encryption is also used everytime you execute an online financial transaction [Paypal or ANZ] and for a multitude of other reasons.
When using encryption, the sender and recipient must use the same mathematical technique (known as an algorithm) to perform the encryption and decryption. That means that if you use your rubbish WhatsApp to send me a message it is not secure because I use Signal.
Encryption can cast a wide net, but without it, you'd all be fucked. Many of you take it for granted. Now that the desktop computer is considered an antique, most people carry their lives with them on their mobile. Yet how many encrypt their phone [to protect their financial details] or back it up [to protect their sanity]. I think I'm being very generous in guessing that no more than 5% would bother. Why - because it's to big a hassle. Time is better spent on bookface or some other meaningless social media than the few seconds [sometimes minutes] it takes to secure your life.
If you lost your phone how much would you pay to get it back?
Do you know how much it costs to protect the information in your phone?
Nothing. ZERO. $0!
Do yourself a favour and take a few minutes out of your boring meaningless life and just do it.
Helping to keep you safe
Nitrokey is an USB key to enable highly secure encryption and signing of emails and data, as well as login to the Web, networks and computers. Other than ordinary software solutions, the secret keys are always stored securely inside the Nitrokey. Their extraction is impossible which makes Nitrokey immune to computer viruses and Trojan horses. Read more about Nitrokey[…]
Even though the Tor network was originally created by the US government, it seems like activities on the dark web and the interests of the federal government are always at odds with each other. This is especially true in recent years, with the Trump administration launching direct attacks against the dark web. No matter what Read more about US vs Dark Web[…]
FontCode has the advantage of moving between digital and physical mediums, which could have specific applications in high-stakes espionage. And the researchers note that FontCode messages can be additionally encrypted if the sender and receiver agree on a key for reordering whatever data is embedded in a given text. Plus, the technique’s more mainstream uses Read more about Send Invisible Messages[…]
The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant. The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data Read more about Accessing Cell Phone Location Information[…]
Last year we analyzed an incident depicted in Star Wars: Episode IV. However, we got the feeling even back then that the security failures that led to the destruction of the Death Star were only the tip of the iceberg. The Empire’s problems with information systems security are clearly of a more galactic nature. Fortunately, Read more about Rogue One – cybersecurity videotraining[…]
The ability to restore your system to an earlier point in time is extremely valuable, as it can save you many hours normally required to install and configure a machine should things go wrong and necessitate a complete rebuild. Whether it’s a bad system update, malware or a total physical loss of your computer this Read more about Macrium Reflect – cloning and imaging software for Windows[…]
The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication, and the Universal 2nd Factor (U2F) protocol developed by the FIDO Alliance (FIDO U2F). It allows users to securely log into their accounts by emitting one-time passwords or using a FIDO-based public/private key pair generated by the device. Read more about YubiKey[…]
Are you looking for some privacy when it comes to emails? Perhaps you want a little more security and anonymity than the likes of Gmail, Outlook and AOL offer. If secure servers and end-to-end encryption are on your email wish list, we have you covered. There are a bunch of alternative email clients out there Read more about 4 Encrypted Email Providers[…]
You don’t have to be careless to lose your laptop, but that doesn’t mean you should just accept the fact that your machine is gone forever. Prey helps recover your stolen devices by enabling you to track and control them remotely, and make them unusable to anyone who’s got them. Prey helps you keep an Read more about Track and recover devices with Prey[…]
Police in Wales managed to arrest and convict a drug dealer by identifying his fingerprint from a photo posted on WhatsApp. The South Wales Police department got its hands on the photo, which depicted the hand of a man holding ecstasy tablets in his palm, after searching the phone of a person arrested in the town Read more about Fingerprints[…]
What are the odds. Well, in fact, they were 50,000 to 1. But, he fought the law and the law won. As I continually stress, this is the one [and only 1] piece of technology where the TLA’s have the advantage. At the moment there is no practical defence, but it’s early days. The [PDF] Read more about Handbook of Face Recognition[…]
Being one of the largest darknet marketplaces at the time of takedown, Hansa enjoyed a fair share of market vendors and customers. What the investigators were after was not just a takedown but more of a takeover to humiliate darknet users. In their understanding, if they took full control of the market before the takedown, the Read more about Darknet now a TLA hunting ground[…]
Introduction AV-Comparatives’ 2017 test of Android antivirus products was inspired by the discovery of an Android app called Virus Shield, which claimed to scan mobile devices for malware, but in fact did nothing of the sort. In reality, running the app simply showed a progress bar, supposed to represent scan progress, followed by an announcement Read more about Android antivirus test[…]
Cloudflare has announced a new DNS service, in partnership with APNIC, that promises faster performance and improved privacy. The new service offers a faster address resolution and a promise to wipe all logs of DNS queries within 24 hours. Cloudflare has published two articles introducing their service. Announcing 126.96.36.199: the fastest, privacy-first consumer DNS service Read more about Cloudflare’s new 188.8.131.52 DNS service[…]
A group of Chinese computer scientists from academia and industry have published a paper [PDF] documenting a tool for fooling facial recognition software by shining hat-brim-mounted infrared LEDs on the user’s face, projecting CCTV-visible, human-eye-invisible shapes designed to fool the face recognition software. The tactic lets the attacker specify which face the categorizer should “see” Read more about Fooling Face Recognition[…]