Search found 30 matches

by [email protected]
Mon Dec 09, 2024 10:52 am
Forum: Currency Data
Topic: How to send an anonymous email?
Replies: 0
Views: 10

How to send an anonymous email?

It is also key to remember that anonymity does not equate to crime.

Despite what you may hear in the media, there are many legitimate reasons for sending an anonymous email. Some common examples might be:

A whistleblower from a company who reveals sensitive information.
A political opponent ...
by [email protected]
Mon Dec 09, 2024 10:46 am
Forum: Currency Data
Topic: Mailfence is a secure and private webmail package .
Replies: 0
Views: 10

Mailfence is a secure and private webmail package .

Organizations that process data belonging to individuals must provide standardized information policies to explain what they do with it, and why.
People have the right to have their personal data deleted (except for data in the public interest, so journalists can breathe again). This includes data ...
by [email protected]
Mon Dec 09, 2024 10:39 am
Forum: Currency Data
Topic: The evolution of email security over the years
Replies: 0
Views: 15

The evolution of email security over the years

For sending emails, a common protocol called Simple Mail Transfer Protocol (SMTP) was adopted in the 1980s .

At that time, the Internet was only used by a small number of institutions. Therefore, security was not the most important thing. The protocol was not designed to protect the content of an ...
by [email protected]
Mon Dec 09, 2024 10:29 am
Forum: Currency Data
Topic: How is it different from an electronic signature?
Replies: 0
Views: 10

How is it different from an electronic signature?

You may have come across the term “digital signatures” on the Internet. You may even have digitally signed emails or documents yourself. However, a digital signature is not the same as an electronic signature.

While an electronic signature can be as simple as a PIN, a digital signature employs ...
by [email protected]
Mon Dec 09, 2024 10:28 am
Forum: Currency Data
Topic: How is it different from an electronic signature?
Replies: 0
Views: 10

How is it different from an electronic signature?

You may have come across the term “digital signatures” on the Internet. You may even have digitally signed emails or documents yourself. However, a digital signature is not the same as an electronic signature.

While an electronic signature can be as simple as a PIN, a digital signature employs ...
by [email protected]
Mon Dec 09, 2024 10:14 am
Forum: Currency Data
Topic: Mailfence - Get your free and secure email
Replies: 0
Views: 13

Mailfence - Get your free and secure email

Yesterday, new vulnerabilities were announced in many OpenPGP and S/ MIME webmail clients . These vulnerabilities, called “Efail”, have attracted a lot of attention in the media. According to our analysis, the OpenPGP Efail vulnerabilities do not affect Mailfence . On the other hand, according to ...
by [email protected]
Mon Dec 09, 2024 10:03 am
Forum: Currency Data
Topic: Examples of pretexting
Replies: 0
Views: 9

Examples of pretexting

Example #1: Internet Service Provider

A person is posing as an employee of your internet service provider. They could easily trick you into telling you that they have come for a maintenance check. First of all, ordinary people are not experts in network maintenance, but rather have a vague notion ...
by [email protected]
Mon Dec 09, 2024 9:54 am
Forum: Currency Data
Topic: How to protect your system from baiting?
Replies: 0
Views: 10

How to protect your system from baiting?

The best defense against any baiting technique or social engineering in general is training, both personally and for your team. We should all strive to create a strong security culture around ourselves – the office, home, etc. Additionally, all individuals should consider “company security” as an ...
by [email protected]
Mon Dec 09, 2024 9:27 am
Forum: Currency Data
Topic: No problem, I'll get it sorted out in no time! I just need your login and password
Replies: 0
Views: 10

No problem, I'll get it sorted out in no time! I just need your login and password

Some examples
One of the most common cases for quid pro quo attacks is where imposters pose as an IT employee . The hacker contacts as many company employees as possible on their hotline to supposedly offer IT support.

The hacker promises to resolve a problem quickly in exchange for the user ...
by [email protected]
Mon Dec 09, 2024 9:13 am
Forum: Currency Data
Topic: Using passwords that are too short
Replies: 0
Views: 9

Using passwords that are too short

Short passwords are easier to guess using brute force . This involves trying all possible combinations of letters until you find the right one. And don't think hackers would get bored with all the work - they have software that does it for them! Avoid using overly common passwords. Or better yet ...