encrypted

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Fri
31
Aug
Dennis Faas's picture

Explained: VPN vs Proxy; What's the Difference?

Infopackets Reader Bill K. writes: " Dear Dennis, Thanks for your excellent and concise explanations regarding VPNs (virtual private networks). I read with interest the latest article, ' Difference Between VPN Server and VPN (Service) ' and also ' ... Do I need a VPN? Are VPNs Safe for Online Banking? '. I was wondering if you could explain the difference between a VPN vs Proxy ? Which one is better? Can I use a Proxy with bit torrent or browsing the web anonymously? " My response: In this case, the term "proxy" refers to a "proxy server", which is a special use server online the Internet that is ... (view more)

Tue
21
Aug
John Lister's picture

Skype Offers Secret Calling, End-to-End Encryption

Skype has added a new "private conversations" feature. Calls made this way will be encrypted so that it's impossible for anyone to usefully intercept or listen in. The data for such calls will use end-to-end encryption. That means the data is ... encrypted on one user's device and kept that way throughout its journey over the Internet until it reaches the other user's device. If the data is intercepted, it won't be of any use. The system will work on a "conversation" basis rather than a call-by-call basis. One user must select the feature, which will then send ... (view more)

Fri
03
Nov
Dennis Faas's picture

How to Fix: Send Encrypted Email to Gmail (Postfix, TLS, SSL Certificates)

Infopackets Reader Martin R. writes: " The email newsletter I receive from you is showing in my gmail as "unencrypted," with a red pad lock . There is also a new warning banner that says: 'Be careful with this message. It contains content that's ... typically used to steal personal information.' The options are: learn more, report this suspicious message, ignore, or 'I trust this message.' This is not the only email I get that shows as unencrypted. What does this mean and how can it be fixed? " My response: Essentially it means that the mail you received (at gmail) was not sent using email ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Fri
24
Mar
Dennis Faas's picture

Explained: When to Encrypt your Hard Drive, and When not to

Infopackets Reader Scott writes: " Dear Dennis, I'm thinking of turning on disk encryption for my Windows 10 computer. I've never done this before. Is there anything to be concerned about or to be aware of? " My response: This is a good question. ... The truth of the matter is that if you encrypt your entire C drive using Windows BitLocker or a third party utility, it's going to slow your system down quite a bit. The reason for this is because every single file written to the drive must be encrypted, and then decrypted when read - including your operating system files. Constantly encrypting and ... (view more)

Mon
02
Feb
Dennis Faas's picture

Can CryptoLocker Infect Shared Drives, Files, PCs?

Infopackets Reader Michael C. writes: " Dear Dennis, I have a USB drive attached to my router. This drive is shared by several computers through the router on my home private network. My question is: if one of my computers became infected by a file ... locking virus such as CryptoLocker , would the network drive or the connected computers become infected or encrypted? If so, is there a way to prevent this? " My Response: It is possible for a virus to self replicate and infect other computers on the network, but that depends on the type of virus. At the time of writing, CryptoLocker is not a self ... (view more)

Thu
28
Apr
Dennis Faas's picture

Sony Admits PSN Hackers Had Access to Unencrypted Data

Yesterday we reported on the hacking of Sony's PlayStation Network (PSN), an online gaming platform for the company's PlayStation 3 (PS3) console. The hack affects 77 million user and has left the PlayStation network paralyzed. When the security ... breach was first announced, Sony remained quiet on the extent of the damage. New details are starting to emerge, with the tech company admitting that some of the personal data available to the hackers was in no way encrypted. This means that data thieves can do as they please with the information they've stolen from the electronics giant. Doubts ... (view more)

Tue
12
Sep
Dennis Faas's picture

Bittorrent Encrypted Downloaders Hit Wall

Besides the popular (and increasingly defunct) peer-to-peer music downloading programs like Kazaa and Napster, perhaps now the most widely-known file transfer system is BitTorrent. The distribution protocol originally designed by Bram Cohen was ... created for the purpose of providing huge amounts of data without incurring ridiculous costs to local bandwidth. Want clarity on that? Check out wikiPedia.org for the whole sha-bang on BitTorrent and why it's primarily used for illegal downloading. (Source: wikipedia.org ) With all of that said, new measures are becoming available for Internet Service ... (view more)

Wed
10
Aug
Dennis Faas's picture

Dictionary Attack

A dictionary attack refers to the general technique of trying to guess some secret by running through a list of likely possibilities, often a list of words from a dictionary. It contrasts to a brute force attack in which all possibilities are tried. ... The attack works because users often choose easy-to-guess passwords, even after being exhorted against doing so. Dictionary (and brute force) attacks may be applied in two main situations: in cryptanalysis, in trying to determine the key needed to decrypt a given piece of encrypted data; in computer security, in trying to gain unauthorized access ... (view more)

Pages

Subscribe to RSS - encrypted