Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 SECURITY


  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data.Today, we will introduce how to use PGP to encrypt and decrypt data on MacOS. Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted ...

30,890 1       TUTORIAL DECRYPTION ENCRYPTION GPG PGP


  WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM

We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps:Install WireGuard and create a key-pair in WireGuard client.Add the Android client peer information in the WireGuard server’s config file.Config the Android WireGuard client to connect to the server.The test environment network configuration: Step 1. Install WireGuard App and create a key-pair in WireGuard client.Open the Android phone/pad Google App Play Store and searc...

3,697 0       TUTORIAL VPN WIREGUARD


  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels)Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think.Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products.Have you ever visited Amazon and instantly got a recommendation for a product you’ve searched for in the past?While this might sound like a conven...

1,006 0       DATA SECURITY VPN


  How to Prevent a Data Breach: Guide For Businesses

The consequences of a data breach are nothing to joke about. From reputation damage to regulatory fines, it is a disaster for any business. So you should always strive to do your best to prevent it. But with so many steps to take, where do you even begin?Businesses of all shapes and sizes should follow this 8-step approach:1. Outline Your AssetsYour assets, whether digital or physical, should always remain in your sight. It should be the very first step you take.Picture anything that might represent a risk and start from there. Include every laptop or smart device, not to mention your websites...

759 0       DATA SECURITY


  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy. Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk. But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into your life right now. TextingOn average, people send and receive 94 text messages per day. It inc...

4,895 0       VPN DATA SECURITY


  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks.What are Online Scams?Online scams come in many different forms but generally originate from one of four platforms: email, SMS, webs...

1,199 0       DATA SECURITY VPN


  Essential Rules To Protect Your Credit Card When Shopping Online

You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others.Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a different password for each store account.Do not shop in public. If someone can see your screen, the...

707 0       MASTERCARD CREDIT CARD SECURITY


  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack.Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack.For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie:Set-Cookie:id=a3fWa;Later the user somehow visits malicious.com and there is a form on the website.<form action="your-bank...

3,258 0       COOKIE JAVASCRIPT SAMESITE CHROME CSRF