Thiru

As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it’s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.

How to Permanently Delete Files Using Kruptos

how to permanently delete files

When you delete a file from your computer, it doesn’t simply disappear from existence—at least, not right away. Even if you immediately empty the Recycle Bin or Trash folder, all your deletion does is earmark the space that file takes up on your hard drive as vacant. Until another file or application comes along to …

How to Permanently Delete Files Using Kruptos Read More »

How to Share Your file with Clients Securely using Kruptos 2 Professional

How to Share Your Data with Clients, Securely

You have confidential data that you need to share with your clients, you can’t send encrypted documents as the client does not have access to, or can’t install a decryption reader program. You can’t send a self-decrypting files via email as many internet services and company policies block attachments that contain Zip or Exe files. …

How to Share Your file with Clients Securely using Kruptos 2 Professional Read More »

Should I Encrypt Every File on My Computer?

Should I encrypt every file

It’s great that you’re thinking about protecting your files, with all kinds of snoops out there (from big government to identity thieves). You’re right, though—you don’t need to encrypt every single file you store or send (especially the MP3s). This article helps to answer your question should i encrypt every file on my computer or …

Should I Encrypt Every File on My Computer? Read More »

US and UK ‘Crack Online Encryption’

encryption

US and UK intelligence have reportedly cracked the encryption codes protecting the emails, banking and medical records of hundreds of millions of people. Disclosures by leaker Edward Snowden allege the US National Security Agency (NSA) and the UK’s GCHQ successfully decoded key online security protocols. They suggest some internet companies provided the agencies backdoor access …

US and UK ‘Crack Online Encryption’ Read More »

NSA’s Access to Microsoft’s Services Detailed

Microsoft helped the NSA get around its encryption systems so the agency could more easily spy on users of its services, reports suggest. Papers given to The Guardian newspaper allege there were close links between the security agency and the tech firm. Microsoft said its collaboration with the NSA only took place because legal obligations …

NSA’s Access to Microsoft’s Services Detailed Read More »

Lost USB Stick Costs Police £120,000 ($188,592.)

USB encryption

Greater Manchester Police has been fined £120,000 ($188,592)for losing a USB stick containing data on more than a thousand people – despite a previous incident leading to an “amnesty” on unencrypted memory sticks. The Information Commissioner’s Office fined the police force £150,000 – but offered a £30,000 discount for early payment – after an unencrypted …

Lost USB Stick Costs Police £120,000 ($188,592.) Read More »

All Credit Card PIN Numbers in the World Leaked

There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used? Which of these pin codes is the least predictable? Which of these pin codes is the most predictable? If you were given the task of …

All Credit Card PIN Numbers in the World Leaked Read More »

Why Passwords Have Never Been Weaker—and Crackers Have Never Been Stronger

In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren’t typical of mass-produced phishing scams. The e-mails said that his login credentials …

Why Passwords Have Never Been Weaker—and Crackers Have Never Been Stronger Read More »

25 Most Used Passwords Revealed: Is Yours One Of Them?

Most used passwords

After it was discovered that more than six million LinkedIn passwords had been leaked as well as many at Last.fm and eHarmony, no one has stopped talking about password and pass-code security. Here is a list of top 25 most used passwords, That’s actually a good thing because it’s an incredibly important topic that many …

25 Most Used Passwords Revealed: Is Yours One Of Them? Read More »

Short Passwords ‘Hopelessly Inadequate

The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack. A password of less than seven characters will soon be “hopelessly inadequate” even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia …

Short Passwords ‘Hopelessly Inadequate Read More »

Pin It on Pinterest

Scroll to Top