Archive by Author

Does Email Encryption Protect Against Spam?

Email encryption is often touted as a means of combating spam. However, encryption alone is not much help in the fight against spam because of the way modern cryptographic protocols use public key enc...

Safeguard Your Encryption Key With Your Life

Today was one of those days. First thing in the morning I had the unpleasant experience of providing support to a client who had just lost all of their email and contacts in Microsoft Outlook. The unp...

Why You Should Use Email Encryption

Safe and secure communications are a concern by the most ordinary individual to the highest officials of companies, organizations, and governments. The digital age is no less different. Access to a pe...

What is PGP Encryption?

Despite its humorous name, Pretty Good Privacy (PGP)  encryption  is quite a heavyweight in the cryptology industry. And although it stands alongside the heavy  encryption  used in...

"Ransomware" – Extortion by Encryption

Recently there has been a rash of reports of computers becoming infected with the Gpcode.ak virus, a new variant of an attack that surfaced a few years ago. Gpcode encrypts data on the affected comput...

How Secure is Online Faxing?

Perhaps, one of the most asked questions about Internet or online fax is this: how secure is online faxing? Is using your computer and your Internet connection a safe way to send and receive your sens...

Understanding Nagra 3 With Popular FTA Receivers

Nagra 3 is a form of encryption made by the Kudelski Group. This company is sub contracted by Dish network and Bell Express view for their smart cards for their paid subscription receivers. Nagra 3 is...

The Shocking Truth About Wireless Networks

A couple of months ago I purchased my first wireless enabled laptop. As I switched it on and began setting it up I was shocked when I realized that my laptop had found and connected to my neighbours w...

Best Travel Wireless Routers

Another innovation in the wireless internet industry is the travel wireless routers. With these devices, mobile professionals or people on-the-go can access the internet anytime. We have listed here s...

Security Consideration for Cloud Applicatons

Be it Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS), cloud environments pose an increased threat to applications data and security practices need to...