Outlook Privacy Plugin Outlook Privacy Plugin is a security extension for Outlook. It enables Outlook to send and receive email messages that are encrypted and/or signed with the OpenPGP standard. It uses your existing GnuPG/GPG keyrings. Installation Download and install gpg4win. Hacking the Internet - bringing down infrastructure Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet? The US Department for Homeland Security (DHS) was set up in November 2002 with the primary responsibility of protecting the USA and its territories from terrorist attacks, accidents, and natural disasters. However, its remit has slowly spread in recent years to cover the nation's Critical National Infrastructure, which includes the structure of the Internet itself.
The Truth Is Coming And It Cannot Be Stopped Shortly after Edward Snowden went public with his findings on the NSA’s surveillance program, he uttered some very powerful words: “All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped.” Truth is coming, and it cannot be stopped. Raymond Wang: How germs travel on planes Close Help with subtitles Desktop / laptop users: please make sure you have the most updated versions of your browser and Flash player, and that Flash is enabled when you visit TED.com. VoIP: voicing security concerns Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. Though Voice over Internet Protocol (VoIP) services are available for both consumer and business markets, it is from the latter that most enthusiasm for it has come; for this reason, it is also where most of VoIP's security issues occur. While the commercial sector has, of course, invested heavily in protecting their data networks from other cyber threats, IP-based voice has been somewhat overlooked. VoIP describes a set of services used to manage the delivery of voice transmissions over a broadband Internet connection instead of using time-division multiplexing (TDM) over a traditional public switched telephone network (PSTN). It works by transmitting analogue voice signals as digitised packets over the Internet allowing it to share the same connections as other digital technologies. Free calls for all?
Online Visual Traceroute Map Data Map data ©2017 Google, INEGI Map Satellite Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers. Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday. Jonathan Zdziarski, better identified as the hacker "NerveGas" in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O'Reilly books including "Hacking and Securing iOS Applications." EVERY SET OF INFORMATION OF iOS USERS IS AT RISK
Quantum cryptography: using photons to create secure keys It is essential that cryptography remains well ahead of the hackers, and that's precisely the motivation for a project that uses the quantum mechanical properties of photons to create tamper-proof keys. The future for the protection of sensitive data could be bright. Researchers have uncovered evidence that the quantum mechanical properties of photons (light particles) may be used to generate tamper-proof keys, and this represents a big leap forward in the fight against computer hackers and other cyber-security threats. Four and a half years ago, the EU-funded Secure Communication based on Quantum Cryptography (SECOQC) consortium successfully demonstrated long-distance, practical quantum-key distribution (QKD) in a fibre-optic network around the Austrian capital Vienna.
ChatSecure — Free and open source encrypted chat for iPhone and Android. ChatSecure, Conversations and Zom We are excited to announce that major changes are planned for the underlying architecture of ChatSecure Android, and that there is a new UX-focused fork of the existing iOS and Android code bases called Zom. In the upcoming months, we will be releasing a new version of ChatSecure Android that will be powered by the core of Conversations, as well as the first releases of Zom for iOS and Android. Both will have a new package name and signing key, so the existing ChatSecure Android app will prompt you on every launch to either download the new version of ChatSecure or Zom. ChatSecure & Conversations Android
Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard. Infrastructure cyber attack threat grows Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action. It is almost a year now since the attack on the control system of an Iranian nuclear reactor by the Stuxnet virus.