Encryption: Keeping Your Data Locked Down
Losing your phone is crippling. Losing a device like a laptop is debilitating. These devices are expensive but the data that they contain may be just as costly. Theft is a constant concern when you are dealing with pricey devices and the information they may contain.Losing your hardware is…
Watch Out For The Next Ransomware: CryptoJoker
Modern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall…
Requesting a ransom from victims is an trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking…
Facebook will now support GPG encryption, which is a variant of OpenPGP encryption, in all email correspondence with customers. This provides end-to-end encryption for security-conscious individuals. However, this may not be for everyone as it requires some knowledge of the actual implementation of the encryption process, including how to obtain a PGP key. To obtain one, each party…
If you own an iPhone or Android handset and care about your privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free, zero-learning-curve app exists for both text and voice, keeping those communications fully encrypted so no one but the person holding the phone on the other end…
miniLock app makes Encryption easy!
Use of encryption is on the rise. More than ever before encryption is being adopted by criminals, governments, and wise technology users. The U.S. court systems annual report on law enforcement eavesdropping in 2013 stated that encryption foiled state police attempts to serveil criminal suspects in 9 different cases. That…
ID Quantique is a small security firm based in Geneva, Switzerland. They specialize in quantum mechanics to boost data security. Their Quantum Key Distribution (QKD) is a method by which a sender transmits a key encoded with photons to a recipient. This is not new technology, this will protect data from hackers and is viewed…
Quantum Cryptography is when you use the laws of physics to encrypt your data. We have been able to encrypt data using vastly large prime numbers that would have to be factored to decrypt the key. The number is so large it would take current cutting-edge processors the projected life-time of the universe to crack.With all things there are…
In the past there have been numerous cases on privacy and what the government/court system considers over stepping ones bounds when doing an investigation. Currently there is a case in Colorado Springs in which Ramona Fricosu is accused of a mortgage scam. Law enforcement found a laptop in her home while doing a search which…