Roadmap, vision and direction for DeepDive
CrypSafe Is Now SecureSuite
CrypSafe has the new name SecureSuite and is open source.
Roadmap, vision and direction for SecureSuite
Media MicroCloud Roadmap
Roadmap, vision and direction for Media MicroCloud
PhotoShield End Of Life
Android has evolved to provide user control of photo location EXIF data.
CrypSafe Caller Identification
Identify callers stored in CrypSafe's SQLCipher Database.
The Dreaded Warning: This Connection is Untrusted or Your Connection Is Not Private
A warning of this nature does not instill trust, and security is all about trust.
Be A Pathological Liar, Your Security Depends Upon It
I admit it, I lie about my age all the time, and yes I claim to be younger than I really am. I lie about all sorts of stuff, it is a habit with me.
Hosting Reveal.js In A Secure MicroCloud
Media MicroCloud has among its components the Nanohttpd web server, the elFinder file manager and a IOCipher encrypted filesystem. This makes a flexible and powerful security tool.
Big Brother Is Scanning You And Your Smartphone
Big brother is scanning you and your smartphone, lets hope you don't have a bad-guy twin out there.
256 Snooping Apps, One Company
A company in China has 256 apps that snoop your personal information. Yes they apologized, but a massive amount of private data is now "out there".
The Cloud, Your Data, Unknowns
...Your data on some set of unknown computers with access by unknown companies and government agencies, what could go wrong?
Managing passwords with CrypSafe
CrypSafe protects passwords and contacts using an AES 256 bit encrypted database and YubiKey NEO authentication.
The Problem With Unlock Patterns
The lock patterns on most Android phones are surprisingly easy to predict. The researcher analyzed 4,000 patterns and concludes that 44% of all patterns start in the top left of the screen.
CrypSafe YubiKey Integration
Nuvolect has integrated YubiKey into CrypSafe. YubiKey is a hardware authentication device that supports one-time passwords, public key encryption and authentication, and the Universal 2nd Factor (U2F) authentication.
Microsoft, Your Privacy, Our Potential
Microsoft collects and uses various types of data, such as data from your emails and text messages, who you call, your contacts and how often you interact with them on your device
Stage Fright Android Malware
...he discovered what is believed to be the worst Android vulnerability discovered to date. This impacts 95% of Android devices, an estimated 950 million users.
Password Best Practices
What many people tend to go for when choosing passwords is efficiency, rather than security. And with mobile search having already overtaken desktop , the risks couldn’t be higher...
Android Malware and what you can do about it
99% of all mobile malware in 2013 was directed at Google’s Android system. This is according to Cisco’s 2014 Annual Security Report.
Roadmap, vision and direction for CounterCloud
subscribe via RSS