privacy

Using Signal correctly

Posted on

There is a major issue with Signal: Your account is tied to your phone number. This makes these apps really easy to use, since there are no usernames or passwords to deal with. It also makes it easy to discover other app users; if someone is a contact in your phone and has the app […]

security

How Encrypted Messaging Works

Posted on

With hackers becoming increasingly savvy, many Australians have turned to encrypted messaging apps to cloak messages between friends, colleagues and whoever else they’re speaking to. But beyond knowing it’s one of the safest ways to communicate digitally, end-to-end encryption remains a bit of a mystery. Here’s how it works and why Australia’s spy agencies are […]

mobiles

Pattern passwords on your phone

Posted on

Facial recognition, fingerprints and iris scanning have all joined PINs, passcodes and swipe patterns. But which should you be using? Along with passcodes, passwords and patterns, smartphone manufacturers are now implementing biometric security processes such as Face ID and iris scanning onto Android and iOS devices to give users a quicker, more convenient way of […]

mobiles

5G risk assessment

Posted on

5G is on the way, but there’s no reason to start running around with your pants on your head just yet. While there will be a lot of hoopla about 5G in the CBD area of major cities there is a very large infrastructure network that will have to be put in place. Think at […]

hardware

Phishing and Security Keys

Posted on

When it comes to online security, confusion about the risks can lead people to obsess over obscure threats while ignoring key innovations that could truly protect them. Even highly-targeted users like politicians and activists don’t fully appreciate the scourge of phishing, and many aren’t familiar with an emerging form of two-factor authentication known as “Security […]

security

Security of Password Managers

Posted on

There’s new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plain text copies of the password lying around memory? Don’t forget to read the Comments!

security

Password Managers: Under the Hood

Posted on

Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file. In this paper we propose security guarantees password managers should offer and examine the underlying workings […]

email

Secure Email Providers

Posted on

There have been numerous privacy scandals with large email providers over the past few years, prompting many to look for the best secure email that respects user privacy. Why switch to a secure email provider? With so many different types of users, there is no single “best secure email” service that will be the top […]

security

Password Stealers

Posted on

Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity. These password stealers are each capable of stealing credentials and other information from a wide variety of programs. […]

security

Password Constraints

Posted on

You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password constraints. To start, let’s look at the impact of an eight-character length constraint alone. There are 95^8 possible combinations of 8 characters. Just by requiring both uppercase […]