The Latest in IT Security

1

With the recent news of the Deloitte internal email systems breach, maybe it’s time to reassess how we craft our emails. Gone are the days of having a strong comfort level that your TLS connections to other firms would protect your messages from being read by unauthorized individuals. Unless your messages always remain encrypted, you […]

Read more ...

1

DERBYCON – Earlier this month, Salted Hash deconstructed a Phishing email that had bypassed company filters and made into the general inbox. The email focused on an outdated company subdivision, and was easily spotted as a scam. However, we’ve since learned the message itself could be part of a larger campaign that has been targeting […]

Read more ...

1

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full end-to-end encryption would mean that only the receiver of the email can decrypt their messages, but sharing public keys and agreeing on a common encryption standard can be tricky for […]

Read more ...

1

Two-Factor Authentication (2FA) has for years been one of the very dependable security technologies that was invoked to address high-risk scenarios — whether to safeguard enterprise resources accessed through the firewall, financial accounts, or — for high-value targets — protect each email login. Most people, to the extent that they spend time thinking about the […]

Read more ...

Categories

FRIDAY, OCTOBER 20, 2017

Featured

Archives

Latest Comments

Social Networks