This is the number one factor that determines the security of your lifestyle.
Encryption refers to any process used to make sensitive data more secure and less likely to be intercepted by those unauthorized to view it. That includes Password Managers [KeePass], encrypting your files or partitions [VeraCrypt] and your sms messages [Signal]. Encryption is also used everytime you execute an online financial transaction [Paypal or ANZ] and for a multitude of other reasons.
When using encryption, the sender and recipient must use the same mathematical technique (known as an algorithm) to perform the encryption and decryption. That means that if you use your rubbish WhatsApp to send me a message it is not secure because I use Signal.
Encryption can cast a wide net, but without it, you'd all be fucked. Many of you take it for granted. Now that the desktop computer is considered an antique, most people carry their lives with them on their mobile. Yet how many encrypt their phone [to protect their financial details] or back it up [to protect their sanity]. I think I'm being very generous in guessing that no more than 5% would bother. Why - because it's to big a hassle. Time is better spent on bookface or some other meaningless social media than the few seconds [sometimes minutes] it takes to secure your life.
If you lost your phone how much would you pay to get it back?
Do you know how much it costs to protect the information in your phone?
Nothing. ZERO. $0!
Do yourself a favour and take a few minutes out of your boring meaningless life and just do it.
Helping to keep you safe
The most spoken thing about iOS 11.4.1 is undoubtedly USB Restricted Mode. This highly controversial feature is apparently built in response to threats created by passcode cracking solutions such as those made by Cellerbrite and Grayshift. We performed several tests, and can now confirm that USB Restricted Mode is maintained through reboots, and persists software restores Read more about This $39 Device Can Defeat iOS USB Restricted Mode[…]
Every Australian will soon have a My Health Record — an online summary of their health information — unless they opt out over the next three months. From Monday, Australians will have until October 15 to tell the Government they don’t want one. Otherwise, a record will automatically be created. How can I opt out? Read more about My Health Record: opt out?[…]
Opening your phone with your fingerprint or facial recognition is cool and convenient. But it also means people can easily unlock your phone without permission – while in the process of being robbed say, or if you’re arrested on suspicion of committing a crime yourself. Thankfully iOS and Android let you temporarily turn off fingerprint Read more about Disable Fingerprint And Facial Recognition[…]
What Is USB Restricted Mode? USB Restricted Mode is a new setting that disables data access to an iOS device through the USB port if the device has been locked for an hour or more. This doesn’t just apply to connections to a computer using a Lightning cable. How Do You Enable USB Restricted Mode Read more about USB Restricted Mode[…]
While routinely working on the security of one e-commerce website, I encountered an unusual type of a brute-force attack that was fairly hard to mitigate. It was based on a delicately simple technique that made it stand out from the crowd. Read this article to learn what kind of an attack it was and how I succeeded Read more about brute-force: A history of one attack[…]
Surveillance tools can be used to catch terrorists or oppress ordinary citizens. Information content filters could be used to bury fake news or manipulate public opinion. Governments and powerful private actors will have access to many of these AI tools and could use them for public good or harm. This, of course, is a done Read more about Facial recognition is here to stay[…]
Nitrokey is an USB key to enable highly secure encryption and signing of emails and data, as well as login to the Web, networks and computers. Other than ordinary software solutions, the secret keys are always stored securely inside the Nitrokey. Their extraction is impossible which makes Nitrokey immune to computer viruses and Trojan horses. Read more about Nitrokey[…]
Even though the Tor network was originally created by the US government, it seems like activities on the dark web and the interests of the federal government are always at odds with each other. This is especially true in recent years, with the Trump administration launching direct attacks against the dark web. No matter what Read more about US vs Dark Web[…]
FontCode has the advantage of moving between digital and physical mediums, which could have specific applications in high-stakes espionage. And the researchers note that FontCode messages can be additionally encrypted if the sender and receiver agree on a key for reordering whatever data is embedded in a given text. Plus, the technique’s more mainstream uses Read more about Send Invisible Messages[…]
The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant. The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data Read more about Accessing Cell Phone Location Information[…]
Last year we analyzed an incident depicted in Star Wars: Episode IV. However, we got the feeling even back then that the security failures that led to the destruction of the Death Star were only the tip of the iceberg. The Empire’s problems with information systems security are clearly of a more galactic nature. Fortunately, Read more about Rogue One – cybersecurity videotraining[…]
The ability to restore your system to an earlier point in time is extremely valuable, as it can save you many hours normally required to install and configure a machine should things go wrong and necessitate a complete rebuild. Whether it’s a bad system update, malware or a total physical loss of your computer this Read more about Macrium Reflect – cloning and imaging software for Windows[…]
The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication, and the Universal 2nd Factor (U2F) protocol developed by the FIDO Alliance (FIDO U2F). It allows users to securely log into their accounts by emitting one-time passwords or using a FIDO-based public/private key pair generated by the device. Read more about YubiKey[…]
Are you looking for some privacy when it comes to emails? Perhaps you want a little more security and anonymity than the likes of Gmail, Outlook and AOL offer. If secure servers and end-to-end encryption are on your email wish list, we have you covered. There are a bunch of alternative email clients out there Read more about 4 Encrypted Email Providers[…]
You don’t have to be careless to lose your laptop, but that doesn’t mean you should just accept the fact that your machine is gone forever. Prey helps recover your stolen devices by enabling you to track and control them remotely, and make them unusable to anyone who’s got them. Prey helps you keep an Read more about Track and recover devices with Prey[…]