Google

Easy Way to Encrypt Sensitive Email & Attachments for Security or Regulatory Compliance

March 29, 2021 / in Blog, Encryption/Security, Tech Essentials / by Zafar Khan, RPost CEO

Who Really Is the Messenger? There is growing debate about the extent to which content platforms are responsible for the content third parties create and distribute. As I write this, the US Congress is holding a hearing about whether Facebook, Twitter and Google should be held liable for the unsavory posts and other controversial content they distribute. This debate is as old as the hills. The only thing that has changed are the company names and some aspects of the m [...]

Think Twice About Sending Your Private Information Unencrypted

September 20, 2019 / in Blog, General / by Zafar Khan, RPost CEO

Big Brother has Built Geofences to Control Behavior, Tesla Drivers Beware City Hall Can Now Control Your Location. The Snowden revelations opened the general public’s eyes to the (alleged) eavesdropping by the NSA and other government organizations. The Hong Kong protests showed the world how today’s mass video surveillance uses facial recognition to identify the location of people (for example, who is protesting what and when). City traffic light cameras send y [...]

Of Course, Alexa has Control of Your House

May 28, 2018 / in Blog, General / by Zafar Khan, RPost CEO

Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work. Alexa has to always be listening to be able to respond to a voice command that may come from you yelling across the kitchen. She has to be ready to respond to back-and-forth question-response to receive further clarifying instructions if needed, so she often may keep listening in case [...]

Install the Simplest to Use Security Tool, RMail, with its Email Encryption

January 08, 2018 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

James Bond Enters Cyber Security Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations). In short, “Meltdown” basically melts security boundaries which are normally enforced by computer hardware. “Spectre” is based on the root, [...]

AT&T and Comcast hit the Motherlode with Internet Privacy Repeal

April 06, 2017 / in Blog, General / by Zafar Khan, RPost CEO

This week, the President approved a measure that removes internet privacy restrictions for Internet Service Providers (ISPs) who connect millions of consumers and businesses to the Internet through wireline and wireless connections. Privacy advocates and late-night talk show hosts have voiced their outrage over this “internet privacy repeal”. But what is actually at stake? What do ISPs know about their users? ISPs like AT&T, Comcast and Verizon, have [...]

The Honeypot for Hackers: Twitter Heats Up

March 31, 2017 / in Blog, General / by Zafar Khan, RPost CEO

The average Internet user has over 100 online accounts, according to Dashlane. Who on earth can keep track of that many accounts? No one really. That’s why millions of people use password managers to keep their passwords encrypted and organized. Typically, password managers are apps that encrypt and store your passwords in the cloud or locally on your computer, requiring you to use just one secure password to access all your passwords. Convenient, right? So what’s the problem? [...]

Email Privacy Act Passes Unanimously in The House of Representatives

February 27, 2017 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Yes, it’s true. The House of Representatives unanimously passed the Email Privacy Act. The fact that everyone in the House can agree on the importance of email privacy suggests that Americans overwhelmingly consider email privacy an essential right. The federal government currently has the right to seize any email, or cloud file that is more than 180 days old, without getting a warrant. This has been true since the Electronic Communications Privacy Act (ECPA) was f [...]

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers. This upfront investment (in social media marketing tools, for example) permits hackers to tailor their message such that it appe [...]