Skip to content Skip to footer

Legitimate E-Mail Or Phishing Attempt?

How To Thwart An E-mail Phishing Attempt E-mail phishing attempts are on the rise thanks to advancements in virus and malware detection. These have slowed down the bad guys’ data mining and money-making attempts. As a result, they're going back to basics. Luckily, e-mail phishing has numerous tell-tale signs. Links: Don't Click 'Em Emailing phishing attempts usually…

Read More

Take Control Of Your Inbox

Automatically Guard Your Inbox Scattered among the regular emails in your inbox, there are most likely spam emails. Although they may be shrugged off by some as simply annoying, these emails contain viruses that can lead to a number of potentially threatening situations for your company’s network. Therefore, it’s essential that your network has a security solution in…

Read More

Facebook To Support PGP Encryption

Facebook will now support GPG encryption, which is a variant of OpenPGP encryption, in all email correspondence with customers. This provides end-to-end encryption for security-conscious individuals. However, this may not be for everyone as it requires some knowledge of the actual implementation of the encryption process, including how to obtain a PGP key. To obtain one, each party…

Read More

How To Spot A Phishing Email

The subject line of the e-mail referenced "your Amazon Account." The body mentioned my credit card and how it had just been "updated." A quick scan of the rest caused temporary alarm. My credit card? I didn't make any changes to my credit card or my Amazon account. Upon closer inspection, I recognized this e-mail for what it…

Read More

Send Anonymous Emails

It’s clear that anonymity, in one way or another, is going to be a part of our digital future. But the folks over at JustLeak.it have looked to the past for inspiration in this brave weird new world. Leak is a web service that lets you send anonymous emails to people: just put in a recipients’…

Read More

Tips About Writing Emails

Emails are an important part of communication with all private and business partners. We should therefore also be careful in writing emails. This is especially true when you consider that most corporate emails are never really deleted and remain on corporate servers and data-center backups for many years. It therefore makes sense to consider a…

Read More

25 Weakest Passwords Revealed

While IT departments are always harping on its users to choose better more secure passwords this tends to go out the window when it comes to personal security. In businesses, IT administrators have the ability to enforce password policies that make users choose better passwords. The only problem with restrictions like this is that if…

Read More