Category Archives: Cryptography

How to use WhatsApp to send encrypted messages

How to use WhatsApp to send encrypted messages If you have not tried WhatsApp Messenger, you’re missing out on encrypted, unlimited messages with images, video, and audio. Get up to speed on installing and using the app. By Jack Wallen … Continue reading

Posted in Cryptography, Privacy, Security | Tagged , , | Leave a comment

Petya ransomware decryption tool sets your files free

Petya ransomware decryption tool sets your files free 12 Apr 2016 by John Zorabedian https://nakedsecurity.sophos.com/2016/04/12/petya-ransomware-decryption-tool-sets-your-files-free/?utm_source=Naked+Security+-+Sophos+List&utm_campaign=6b01088e1e-naked%252Bsecurity&utm_medium=email&utm_term=0_31623bb782-6b01088e1e-454974845 Successful ransomware families including CryptoWall, TeslaCrypt and Locky encrypt the data files on your hard drive and require you to pay a ransom to get the key … Continue reading

Posted in Cryptography, Education, Security | Tagged | Leave a comment

How to Enable Multifactor Security on Amazon

Krebs On Security https://krebsonsecurity.com/2015/11/how-to-enable-multifactor-security-on-amazon/ Nov 15 How to Enable Multifactor Security on Amazon Amazon has added multi-factor authentication to help customers better secure their accounts from hackers. With this new feature enabled, thieves would have to know your username, password, and … Continue reading

Posted in Blogs, Cryptography, DataLoss, Education, Privacy, Security, Uncategorized | Tagged | Leave a comment

The undercover war on your internet secrets: How online surveillance cracked our trust in the web

The undercover war on your internet secrets: How online surveillance cracked our trust in the web By Steve Ranger http://www.techrepublic.com/article/the-undercover-war-on-your-internet-secrets-how-online-surveillance-cracked-our-trust-in-the-web/?tag=nl.e101&s_cid=e101&ttag=e101&ftag=TRE684d531 A black shrouded figure appears on the screen, looming over the rapt audience, talking about surveillance. But this is no … Continue reading

Posted in Cryptography, Security | Tagged , , | Leave a comment

How the “Great SIM Heist” could have been avoided

How the “Great SIM Heist” could have been avoided by Paul Ducklin on February 23, 2015 https://nakedsecurity.sophos.com/2015/02/23/how-the-great-sim-heist-could-have-been-avoided/ You may very well have read about the latest leak supposedly sourced from the secret data stolen by whistleblower Edward Snowden. The three-bullet … Continue reading

Posted in Cryptography, DataLoss, Privacy | Tagged , , , , , , , | Leave a comment