Articles

Email Security in Light of NSA Surveillance

When Edward Snowden was asked if someone wants to stay off the NSA’s radar, could he or she encrypt emails and send them without arousing any suspicion? His response was “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA […]

Dropbox Hack Hoax Reveals Cloud Security Concerns

It seems like hardly a day goes by without hearing about data breaches or cyber attacks somewhere. There is an even greater impact if one of these breaches is of a cloud storage system. Many of us rely on different cloud storage systems like Dropbox, SpiderOak, or SugarSync to store and backup our important files […]

How Secure are Mobile Banking Apps?

There is a huge market for mobile apps because people are becoming more inclined to getting their work done through “easy and convenient” mobile apps rather than sitting in front of a PC. As we know, with the growth of any new technology comes new security risks. One of the major areas of concern is […]

Upcoming Ransomware of 2014: Prison Locker

Cryptolocker Ransomware has infected thousands of computers and has allowed hackers to make millions of dollars. Cryptolocker encrypts all your files and documents and restricts your access to your system until you pay a ransom amount to the hacker. This very serious malware attack has gained momentum over the past few years. There are some precautions […]

Malware Attacks Thousands of Yahoo Users

We have been adequately warned about not clicking on malicious websites, ads, or email attachments, as they have the potential of taking over our entire system. Even then, out of ignorance or due to lack of attentiveness, people fall prey to such kind of attacks. However, what if a hacker takes control over the servers […]

Exclusive Interview With ACLU On NSA Ruling

“One of the disturbing truths about the NSA’s surveillance powers is how little can be done to avoid their reach.” -Brett Max Kaufman, National Security Fellow at the ACLU, in an exclusive interview with SpiderOak. The NSA’s mass collection of phone and internet records under counterterrorism laws have been opposed by many human rights leaders […]

NSA Plans on Building Quantum Computers to Break Encryption

These days, it does not come as a surprise to any of us when we hear about the NSA working on new ways to break the security standards on the Internet. In the past we have seen how the NSA has been successful in collecting huge amounts of user data by providing legal notices, breaking […]

Snapchat Hack Leaks Millions of Names and Numbers

The New Year did not start at a very good note for the most popular photo sharing application, Snapchat. On Wednesday, Jan 1, 2014, a major security breach took place at Snapchat. A hacker group exposed the phone numbers and usernames of approximately 4.6 million users on the Internet. Snapchat is used by millions of people […]

Biggest Security Events of 2013

As the year 2013 bids adieu, let’s take a look back at some of the biggest privacy and security issues of last year. As an information security professional, I found this year to be very interesting from a cyber security point of view. We got to see many new forms of cyber attacks and new […]

Silent Circle Replaces NIST Encryption Standards

In Monday’s post, I mentioned the importance of end-to-end encryption tools like PGP and Silent Circle for better security of our data. Silent Circle has decided to move away from the National Institute of Standards and Technology (NIST) encryption standards and implement its own cryptographic technologies for extra protection from the NSA surveillance activities. In […]