by Jamii Corley | Jul 31, 2015 | Encryption, How the Net Works, Interesting Items, Resources, Security, Tips and Tricks
In our last post we showed you how to install the Mailvelope browser extension and generate PGP public and private keys, and how to import someone’s public key. Now we’d like to actually use this structure to send encrypted email. At this point if you use...
by Jamii Corley | Jul 31, 2015 | Encryption, How the Net Works, Interesting Items, Resources, Security, Tips and Tricks
In that last few years we’ve come to see more and more that things we thought were private, simply aren’t. Whether it is companies that want to sell you things, the government wanting to find terrorist plots, or thieves looking for personal data to aid...
by jnelson | Jul 21, 2015 | News, Security, Warnings
There’s a certain rich irony in the recent hack of the notorious Hacking Team. Though they self-righteously claim to be selling solutions to law enforcement, Hacking Team is an evil group of professional hackers and malware vendors. They got pwned themselves...
by jnelson | Jul 11, 2015 | News, Security, Warnings
This month’s issue of the Portal is all about the giant hack of the Office of Personnel Management’s files. Anyone who has applied for a government security clearance since 2000 – or is a close relative or friend of someone who did – should definitely read...
by jnelson | Jun 25, 2015 | News, Security, Warnings
Anyone who harbors suspicions of what the search engine giant might be up was given good reason to be even more alarmed recently. Google has been accused of eavesdropping on users of its Chromium browsers. Some people noticed that the browser would download modules...