Dennis Faas's picture

How to Fix: Send Encrypted Email to Gmail (Postfix, TLS, SSL Certificates)

Infopackets Reader Martin R. writes: " The email newsletter I receive from you is showing in my gmail as "unencrypted," with a red pad lock . There is also a new warning banner that says: 'Be careful with this message. It contains content that's ... typically used to steal personal information.' The options are: learn more, report this suspicious message, ignore, or 'I trust this message.' This is not the only email I get that shows as unencrypted. What does this mean and how can it be fixed? " My response: Essentially it means that the mail you received (at gmail) was not sent using email ... (view more)

John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Dennis Faas's picture

Explained: When to Encrypt your Hard Drive, and When not to

Infopackets Reader Scott writes: " Dear Dennis, I'm thinking of turning on disk encryption for my Windows 10 computer. I've never done this before. Is there anything to be concerned about or to be aware of? " My response: This is a good question. ... The truth of the matter is that if you encrypt your entire C drive using Windows BitLocker or a third party utility, it's going to slow your system down quite a bit. The reason for this is because every single file written to the drive must be encrypted, and then decrypted when read - including your operating system files. Constantly encrypting and ... (view more)

Dennis Faas's picture

Can CryptoLocker Infect Shared Drives, Files, PCs?

Infopackets Reader Michael C. writes: " Dear Dennis, I have a USB drive attached to my router. This drive is shared by several computers through the router on my home private network. My question is: if one of my computers became infected by a file ... locking virus such as CryptoLocker , would the network drive or the connected computers become infected or encrypted? If so, is there a way to prevent this? " My Response: It is possible for a virus to self replicate and infect other computers on the network, but that depends on the type of virus. At the time of writing, CryptoLocker is not a self ... (view more)

Dennis Faas's picture

Sony Admits PSN Hackers Had Access to Unencrypted Data

Yesterday we reported on the hacking of Sony's PlayStation Network (PSN), an online gaming platform for the company's PlayStation 3 (PS3) console. The hack affects 77 million user and has left the PlayStation network paralyzed. When the security ... breach was first announced, Sony remained quiet on the extent of the damage. New details are starting to emerge, with the tech company admitting that some of the personal data available to the hackers was in no way encrypted. This means that data thieves can do as they please with the information they've stolen from the electronics giant. Doubts ... (view more)

Dennis Faas's picture

Bittorrent Encrypted Downloaders Hit Wall

Besides the popular (and increasingly defunct) peer-to-peer music downloading programs like Kazaa and Napster, perhaps now the most widely-known file transfer system is BitTorrent. The distribution protocol originally designed by Bram Cohen was ... created for the purpose of providing huge amounts of data without incurring ridiculous costs to local bandwidth. Want clarity on that? Check out wikiPedia.org for the whole sha-bang on BitTorrent and why it's primarily used for illegal downloading. (Source: wikipedia.org ) With all of that said, new measures are becoming available for Internet Service ... (view more)

Dennis Faas's picture

Dictionary Attack

A dictionary attack refers to the general technique of trying to guess some secret by running through a list of likely possibilities, often a list of words from a dictionary. It contrasts to a brute force attack in which all possibilities are tried. ... The attack works because users often choose easy-to-guess passwords, even after being exhorted against doing so. Dictionary (and brute force) attacks may be applied in two main situations: in cryptanalysis, in trying to determine the key needed to decrypt a given piece of encrypted data; in computer security, in trying to gain unauthorized access ... (view more)

Dennis Faas's picture

Digital Steganography: The art of Hiding Files

I received a fascinating question the other day from Infopackets Reader John B. He writes: " Dear Dennis, I just read about a new privacy program which is able to hides files inside jpeg image files. My question is: If I downloaded a jpeg file from ... the Internet, can it have a virus hidden inside? The reason why I ask is because I found a jpeg image file in my temporary Internet file folder. When I tried to open it, I was told that the file .exe could not be located. I immediately deleted the jpeg and am worried that my PC is now infected. What do you think? " My response: What you ... (view more)

Subscribe to RSS - encrypted