Tag Archives: Encryption

Cyber CSI: Digital Forensics and the Fingerprints You Leave Behind

In the 1980’s, computers slowly started to become a part of daily life for the general population. By the mid-1990’s, this… View Article

Posted in Security | Tagged , , , , , , , , | Leave a comment

A Glimpse Into the Future of Digital Security at the RSA Conference 2017

Every February, the flagship RSA Conference comes to San Francisco. It brings with it a bevy of cryptography and information… View Article

Posted in Security | Tagged , , , , , , , , , | Leave a comment

Burner Phones: Will Tightening Restrictions on Prepaid Cell Phones Solve Anything?

In March, California Congresswoman Jackie Speier introduced a bill to the House that would require those purchasing prepaid cellular devices to submit… View Article

Posted in Privacy | Tagged , , , , , , , , , , | 49 Comments

SITREP 05: Taliban Attack in Kabul // Marine Budget Cuts Ground Aircraft // Urgent Windows Vulnerability

An explosion in the city of Kabul, Afghanistan killed at least 28 and wounded over 300 on Tuesday morning. The… View Article

Posted in News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | 2 Comments

Lock it Down: How to Use Encryption Options Already Installed to Lock Your Data Down

Encryption is the application of cryptographic techniques to encode data so only authorized users can read the information. With the ubiquity… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , | 7 Comments

FBI Tells Apple, “Just This Once.” Why a One Time Exception is a Slippery Slope

Major news outlets and social media are ablaze today, with self-proclaimed pundits offering their analysis on Apple CEO Tim Cook’s… View Article

Posted in Privacy | Tagged , , , , , , , , , , | 72 Comments

Is Blackphone the World’s First NSA Secure Phone?

If you’ve ever used PGP encryption to communicate over the internet, you may be familiar with its creator, Phil Zimmerman… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , | 18 Comments

Silent Circle – Military Level Encryption Brought to Your Phone

My phone started to ring. Was it really who I thought it was? The display said that the connection was… View Article

Posted in Privacy | Tagged , , , , , , , , , , , | 22 Comments

Securing your Digital Life: Home Wireless Network

This entry is part 1 of 2 in the series Securing Your Digital Life

1 of 2 in the series Securing Your Digital LifeIn today’s world, we rely on electronic devices more than ever… View Article

Posted in IT, Privacy | Tagged , , , , , , , , , , , | 14 Comments

This Message Will Self-Destruct…

There’s an interesting Website we stumbled upon the other day that provides a secure, auto-deleted messaging service. So what exactly… View Article

Posted in Security | Tagged , , , , | 20 Comments