How to use PGP encryption on Windows for free
By in Information Security, on November 13, 2018 at 2:16 pm
How to use PGP encryption on Windows for free

Learn how to use PGP encryption in Windows, by using Gpg4win, Thunderbird and Enigmail. All of these programs are free, offering you a range of advanced security settings.

Convincing new TV licensing scam targets UK residents: warning
By in Information Security, on November 8, 2018 at 12:19 am
Convincing new TV licensing scam targets UK residents: warning

A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate your account if you fail to update your billing information.

How to use PGP encryption with Outlook
By in Information Security, on November 7, 2018 at 12:49 pm
How to use PGP encryption with Outlook

This guide teaches you everything you need to know about setting up PGP with Outlook. It covers everything from downloading the programs to sending your first encrypted message.

How to use PGP encryption with Gmail
By in Information Security, on November 7, 2018 at 12:43 pm
How to use PGP encryption with Gmail

Learn how to set up PGP encryption for your Gmail using the Mailvelope or FlowCrypt extensions.

What is PGP encryption and how does it work?
By in Information Security, on October 30, 2018 at 1:08 pm
What is PGP encryption and how does it work?

Learn about what PGP encryption is, why it was invented and how it works. It relies on a number of cryptographic techniques, including public-key encryption, symmetric-key encryption and digital signatures.

What we can learn from how cybercriminals run phishing campaigns
By in Information Security, on October 12, 2018 at 4:58 pm
What we can learn from how cybercriminals run phishing campaigns

Phishing is often used by hackers to gain access to the target system. In this article, we’ll dive into specific techniques and tools used in phishing.

What is the Computer Fraud and Abuse Act?
By in Information Security, on October 5, 2018 at 3:06 pm
What is the Computer Fraud and Abuse Act?

The Computer Fraud and Abuse Act (CFAA) is an important cybersecurity law. Discover more about the law, how it’s used, and problems with implementation.

What is Sextortion (with examples) and how can you avoid it?
By in Information Security, on October 5, 2018 at 2:54 pm
What is Sextortion (with examples) and how can you avoid it?

Sextortion is a terrifying cybercrime that’s on the rise. Find out more about sextortion, including examples, and what you can do to prevent it.

What is AES encryption and how does it work?
By in Information Security, on October 5, 2018 at 1:33 pm
What is AES encryption and how does it work?

AES encryption is the global standard for keeping your online communications safe. Learn what AES does, why it was developed and how it works.

Houseparty Video Chat App: A parent’s guide to safe usage and security concerns
By in Information Security, on September 28, 2018 at 2:58 pm
Houseparty Video Chat App:  A parent’s guide to safe usage and security concerns

The Houseparty video chat app is designed for young adults, but is especially popular among teens. Parents should be cautious due to some safety concerns.

Page 1 of 12