secure

Fri
19
May
John Lister's picture

One in Three Used Drives Not Secure

A data recovery firm says it found 3.1 million "deleted" files on a second-hand hard drive. It also found 35 percent of drives had readily-restorable files. The experiment by Secure Data Recovery comes with an obvious warning. It's a company that ... helps people recover deleted or corrupted files from their own drives, so it has an interest in highlighting that such recovery is possible. That said, in this experiment conducted for Tech Radar, the company only tackled those drives where recovering data proved a straightforward task. (Source: techradar.com ) This involved buying 100 hard drives, ... (view more)

Fri
08
Jan
John Lister's picture

Chrome Defaults to Secure Website Version

Google Chrome will now look for a secure version of a website first by default. It could mean a tiny delay accessing some sites, but should nudge more sites to increase security. The change to the browser involves how it handles cases where users ... simply type in the domain (such as infopackets.com) rather than the full website address (such as http://www.infopackets.com or https://www.infopackets.com ). The browser being able to convert one to the other makes it much quicker to type website addresses and allows browsers to use a single space for users to input both website addresses and search ... (view more)

Wed
28
Oct
John Lister's picture

Zoom to Completely Encrypt Video Calls

Zoom is to completely encrypt video calls at all times for most users. It will mean neither Zoom itself nor law enforcement agents or security services can access the content of calls. At the moment, Zoom encrypts the data that flows between ... individual participants on a call. However, it's Zoom's own servers which generate the encryption key issued to each participant. That means it's technically possible for Zoom to decrypt calls. While Zoom insists it's never had any intention of doing so, it does leave it open to pressure or legal threats from law enforcement officials to get access to ... (view more)

Tue
03
Mar
John Lister's picture

Unsafe VPN Android Apps Threaten Privacy

Some of the most popular VPN apps for Android are dangerous to use, according to a leading review site. The VPN apps, which are supposed to protect privacy, actually expose users to attacks according to VPN Pro. A VPN, or virtual private network, is ... meant to be a way to boost privacy online. It works by re-routing traffic through a middle-man server to make it appear that your IP is in another location. When configured properly, the VPN effectively creates a secure online connection that means even though data is going through the Internet, it can't be read by anyone other than the sender and ... (view more)

Tue
27
Aug
Dennis Faas's picture

Explained: Do I need a VPN on a Public Network?

Infopackets Reader Neil W. writes: " Dear Dennis, Thanks for your interesting article on whether a VPN is safe for online banking . However, one question I can't seem to find the answer to is: do I need VPN on a public network? Do I need a VPN on a ... private network? What about a VPN on a shared network? An example might include a student doing banking at a university shared network. What do you think? " My response: Short answer: A VPN, or virtual private network is useful in a few cases - for example: hiding your tracks online (to some extent, but with major limitations) or accessing geo- ... (view more)

Wed
14
Aug
John Lister's picture

Chrome, Firefox Ditch EV SSL Padlock System

Chrome and Firefox will stop indicating when websites have received an "extra level of verification" to prove they are in fact genuine. The move is largely due to the fact that most users aren't aware of the Extended Validation SSL (EV SSL) system. ... The Extended Validation SSL (secure socket layer) security certificates go beyond the standard SSL certification scheme, which browsers use to show that data being sent to and from a website is in fact encrypted and secure. This means that communication is encrypted, and that no one can eavesdrop or steal data mid-stream. In other words, ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Mon
17
Dec
John Lister's picture

Android Phone Security Duped by 3D Printed Head

A 3D printed model head fooled facial recognition security features on four Android phones. It's not exactly a practical blueprint for thieves, but does show the security of such features varies dramatically between handsets. Thomas Brewster of ... Forbes commissioned a 3D model of his head that combined data from 50 cameras. It cost him a little over £300, equivalent to around $375 USD. (Source: forbes.com ) Angle ...<a href="/news/10470/android-phone-security-duped-3d-printed-head" class="more-link">view more

Thu
29
Nov
John Lister's picture

Web Users Warned Over Browser Green Padlock Trickery

Security researchers have warned that nearly half of all phishing sites falsely display the browser padlock symbol commonly associated with secure websites. It's a reminder that the browser padlock symbol only covers one aspect of security. Most ... major browsers display the padlock symbol when a website uses a technology, most commonly Secure Sockets Layer (SSL), to encrypt data as it passes between the user's computer and the website, or vice versa. Such sites have an address starting "https://" rather than "http://". The purpose of the padlock symbol is to indicate to the user that the ... (view more)

Fri
31
Aug
Dennis Faas's picture

Explained: VPN vs Proxy; What's the Difference?

Infopackets Reader Bill K. writes: " Dear Dennis, Thanks for your excellent and concise explanations regarding VPNs (virtual private networks). I read with interest the latest article, ' Difference Between VPN Server and VPN (Service) ' and also ' ... Do I need a VPN? Are VPNs Safe for Online Banking? '. I was wondering if you could explain the difference between a VPN vs Proxy ? Which one is better? Can I use a Proxy with bit torrent or browsing the web anonymously? " My response: In this case, the term "proxy" refers to a "proxy server", which is a special use server online the Internet that is ... (view more)

Pages

Subscribe to RSS - secure