Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Home » Posts filed under Security
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
Wednesday, 17 December 2014
Wednesday, 17 December 2014
- 1 Comment
With holidays around the corner and most ecommerce sites throwing away huge offers and discounts, we have to be extra careful against online scams and frauds. In this post today, we have listed down some helpful tips that you can use for safe credit card usage on the Internet.
So, if you usually shop online with your credit card, here are some safety tips you must consider.
Choose Credit Cards Over Debit Cards
If you use your credit card most of the time for online shopping, then you are already following an important security tip. If any fraudulent charges occur on your credit card, you will still have time to report it to your bank and avoid paying for the transaction made on the card. On the other hand, for a debit card, ‘real money’ gets debited instantly, and it may take days before you can reclaim the money. Also, most banks offer zero liability on lost credit cards. If we take HDFC bank into consideration, it states, “If you lose your card, report it immediately to our 24-hour call centre. After reporting the loss, you have a zero liability on any fraudulent transactions made on your card.”Go a step further – Use a Virtual Credit Card
Another credit card security tip that works effectively, is using a virtual credit card. As the name suggests, this is not a ‘physical card’ and not issued physically. The following are the benefits of using a virtual credit card:- A virtual credit card is mostly valid for 21 – 48 hours only, depending on the bank that has issued it.
- The card can be used for making one payment only.
- Any unused amount left in the card gets credited back to the customer’s account.
- A virtual credit card cannot be stolen or cloned, as it is an intangible property.
Know your Online Shoppe
Always go for trusted, well-known, reputable, online shopping sites. This is more important when you are purchasing expensive items. It is also wise to go through the privacy and security policy of the site that you are shopping from. You might come across a site that offers unbelievable deals; but odds are, the deals are fake or not what they appear to be.Understand What Information Your Online Shoppe Needs
A standard checkout/payment page of most online shopping sites require you to give the following details:- Full name as printed on the card
- Credit card number
- Expiration date
- CVV number
- Shipping/Billing address
But, if the payment page asks for your ATM pin, net banking login ID and password, mother’s maiden name, etc., then you have enough reasons to treat this as a phishing attack. Immediately close the browser, and report the website to the right authority such as Google.
Avoid Public and Free Wi-Fi Networks
This credit card security tip also applies to all kinds of financial transactions that you do online. Avoid using your credit card over public computer network such as cyber cafes and free Wi-Fi. These networks are less secured or have no security against hackers who can spy on your information and misuses it for illegal purpose.Look for “HTTPS” and pad lock symbol
Before giving away your credit/debit information on the checkout page of any site, always ensure that the URL in browser’s address bar begins with “https://” and is accompanied by a “locked padlock” symbol. If it is otherwise, then do not proceed with the purchase. Go for a safer option such as cash-on-delivery.The Better way to Protection Against Phishing and Threats be Sure you have a Better Antivirus System on your Computer or Laptop.
Don’t Follow Links in Emails
If you receive an email from your online shopping site about a great offer, and asks you to follow a link to view it, then here’s what you should do. Go to the website by typing its URL in the browser or Google, and verify if it is really hosting any such offers. Never click such links in emails even if they seem to have come from your favorite or a popular retailer.Have Anti-phishing Protection on Your Computer
Nowadays, it is impossible for normal users to differentiate a fake, phishing website from a real one. Even a professional, neatly done website that seems innocuous, can be a compromised site waiting for you to fall into its trap. Hence, having an anti-phishing protection on your computer can be extremely beneficial. This feature, as the name suggests, automatically restricts user from landing on a fraudulent or phishing website.If you think you have some more credit card security tips to add to this post, please feel free to leave them in the comment box below. Stay safe!
Basically, Honan’s digital presence was all but destroyed after hackers managed to delete his Google Account, wipe his iPhone, iPad and Macbook and deface his Twitter account. The reason for the attack, according to one of the people behind it, was “lulz” and to play around with a three-character Twitter name.
Honan’s position as senior reporter at Gizmodo did nothing to provoke nor protect him from the attack. Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.
Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.
Though Amazon and Apple have responded by updating their security policies, hopefully to prevent future attacks along the same vector, many have been wondering what they can do to strengthen their security online.
The truth is, no security is perfect and anyone who is a valuable enough target can be bit. But you can make yourself a more difficult target and someone who can not be trivially exploited and you can minimize the damage an attacker can do.
With that in mind, here are a few mostly common sense steps that can get you started to being more secure online.
- Make or Write Smart Password Using Letter, Numerical, Upper & Lower Case:
A good password should be long, at least eight characters, easy to remember and contain a combination of lower case letters, upper case letters, numbers and symbols. Most importantly, it should not be a word found in the dictionary nor any variation of one.Also, you should never reuse a password for more than one site and you should never write your passwords down.
If this sounds like a lot, it is. It’s too much for pretty much anyone to do without help.
One solution is to use a device known as a cipher to generate passwords on the fly. For example, you can look at the domain name of the site and generate a password based on it. Basically, to do this, you look at the site you’re at and create a hard-to-guess password from the domain.
For example, facebook might have a password of g1s@v3r$ if you use the cipher of looking at your keyboard and writing the first four letters of the domain “face” using the keys one to the right of the real ones and then breaking up the letters with the numbers 1-4 alternating with the shift function every other time. Look at your keyboard (US) if you are unclear.
Alternatively, you can also use services like LastPass to help you generate, store and automatically fill in passwords. However, these services are a trade off between random, difficult passwords and a new central point of failure. As long as the service itself is secure, you’re most likely fine.
- Two Factor Authentication Attempt:
Matt Cutts at Google recommended this strongly on his blog and I agree.Two factor authentication simply means that you need two forms of authentication to log into a site. However, they have to be two different forms (not simply two passwords).
One form, obviously, is your password (something you know) but the other is usually something you have. These days, your cell phone is the most likely thing as many services, such as PayPal and Google, will send you a text that you have to repeat to log in. Google also, has its own app for most phones and that’s how LastPass handles its two-factor authentication.
This is an incredibly powerful tool because, even if your password is compromised, which Honan’s attack shows it can be easily in some cases, your account is not. It’s very unlikely, barring drastic steps, someone is going to have both your cell phone and your password. One or the other is possible, even likely, but not both.
If your account offers two factor authentication, turn it on as soon as possible. It’s a very powerful step.
- Personal Information:
A lot of sites will ask you to create backup security questions in case you forget your password. Common ones involve things such as your favorite pets name or the street you grew up on.The problem is that many of these things can be trivially researched. However, you can beat this by simply lying on the questions.
After all, there’s no rule that you be honest, just that you remember your answer. If you’re asked for your favorite pet, give the name of your childhood imaginary pet. Ideally, your answers should be related enough to the questions to remind you of what you said, but far enough off base that it’s not trivially guessed.
- Credit Card Common Sense Tips:
Credit cards are like passwords, ideally they should not be used more than once and should never be stored. As Honan’s attack showed, even if they aren’t used for financial gain, they can still be used to open up exploits into other accounts.If you have a bank or a credit card company that will issue single-use credit card numbers, use them. They are immensely powerful. If you don’t, try to avoid storing your credit card numbers and especially about storing one number across multiple accounts.
It might be annoying to re-enter your credit card data every time you want to buy a book on Amazon, but it could be what saves you from a minor hack becoming a major one.
- Bottom Line:
In the end, security is about the trade off between protection and convenience. Most of the things that make you more secure will also take up more of your time.It’s really annoying to have to find your phone every time you want to log in to your gmail or you have to enter a complex password that’s difficult to guess. Life would be much easier if we didn't have to deal with those things.
But, of course, that isn't practical. The problem is that others don’t value your life, your privacy, your information or your work. They would happily destroy it all, whether it’s for profit, a vendetta or just “lulz”, there are individuals who will not think twice about destroying your world.
If you realize that and that no one is too unimportant to be a target, then it only makes sense to take precautions now. Today’s hassle may save you from tomorrow’s attack.
Sunday, 14 December 2014
Sunday, 14 December 2014
- 0 Comments
DBT |
The smartphone has a lot to do and the problem of why we ended up in front of the battery leads. If you think that your smartphone battery fast Tan is speaking, you can try these methods:
1. Keep it Turn Off
- Bluetooth, Wi-Fi
Turn on Wi-Fi only smartphone, when you want to use. Wi-Fi is also on going out of range, the phone looks for Wi-Fi signal and battery costs will be. Very rarely do people use GPS. Keep it to one of these. Keep it on all the time is also spent batteries. Wi-Fi is a way off: Settings-Wireless Settings-WiFi-off
- Animation
If the battery is the most important thing for you, then turn off the animation in all applications. Style will be reduced, but will increase battery life. Follow this method to: Settings-Developer Options-Drawing let go of all the animation either to reduce or Animation Scale.
- Mobile Data
Take the battery to be completely closed because the phone is not possible to charge, so be sure to Mobile Data Off. The phone will go on, the Internet will not work-related services.
- Location Services
The (Settings-Locations Services) to go into the box to remove the tick mark. Services will be on location, trying to track the location of the phone will spend the battery. When needed, you can location on the service for a while.
2. The lower the as you can These All
- Screen Brightness
Most battery eats screen. Screen, the bigger, the higher will be the bright and high resolution, the more power it needs. If your phone is the screen brightness to the auto mode, then use it, do not keep the brightness around 50 per cent. The battery will cost less. It is an advantage and that it will have less emphasis on your eyes. Especially in times of need such strong sunlight can increase the brightness when viewing photos or videos.
- Screen timeout
Screen timeout means- nothing of the screen will automatically light how long. The lower the screen timeout on your phone, the battery will last much longer. To reduce it to the phone, go to: Settings-Sound & Display-Screen timeout
- The use of cameras and video
When the phone's battery is low, then the deliberate use of camera and video. These two things will require power. When the phone began to feel more warm, to understand that the battery is being spent rapidly and now needs to rest.
3. Things to avoid
- Vibration
Ringtones to phone vibrates more than the voice has to be strong, so if you do not have to keep the phone on vibration mode. Disable it and hold. Follow this method to: Settings-Sound and Display-PhoneVibrate
- Live Wallpaper
Fish floating on the screen of the phone or any other live wallpaper to-use, then you should assume that the battery would cost too much. Instead of a dark color would be nice to wallpaper photos.
- Widgets
Widgets icon they are larger than normal size, which take up more room on the screen of your phone - like the weather or the Facebook and Twitter Widgets tell. Widgets automatically updated every battery feed themselves. Of application icons on the home screen of the phone Do not crowd. Sometimes use the app, do not keep them on the home screen, but went in the Open menu.
- Two Antivirus
Do not use the phone two Antivirus. Some people think that the two Antivirus will make their phone more secure, but it is not. It will make your phone battery will continue to be sluggish.
4. Check Always these things
- How much battery Use
Go to Phones Settings (Settings-Battery Use) to see which applications are spending so much battery. If the application without eating much battery, remove it from the phone.
- 2G or 3G and 4G mode
So much so that you do not have plans 3G mobile company and your phone is running on 3G mode. Which mode is running on the phone, to the Check (Settings-More Settings-Mobile Networks-Network Mode / Preferred network type) visit and are not using the 3G or 4G, 2G mode Bring it. 3G or 4G are used if, but to a place where 3G or 4G service may not go so similar 2G mode, the battery cost will not find the phone 3G signal.
5. focus on application
- Avoid unnecessary apps
These days is full of apps and even free, but that does not mean that you are downloading app poke. Download apps only work if you use some app is closed so you remove them from the phone. Downloading is easy to uninstall unnecessary applications, but what about those useless apps, which were already in the phone, but you do not ever use.
Android app version 4.0 and above has facilities Disable to: Settings-Application Manager-All tab. You do not use the app, press the Open button to Disable. If you do not see the option to Disable, then uninstall it before all the updates. Disable then try again. If you can not understand the service, they do not Disable, or the call may be wrong.
- Properly Close
Application by pressing the Home button will not stop, they just go in Background spend and keep the battery. By then hit the back button to close the app continue until the app to get out of. Or use the Exit button.
- Auto-update
Android phones are updated all day came App. Such updates to both the battery and data overshadowed. Auto Update to Off (Menu-Play Store-Settings-Auto Update apps) Go and Do not auto update set.
- Use bookmarks
Ever noticed how your phone services are continually go on and do the sink? Facebook, Twitter, Gmail, Office Mail, Google Plus ... they spend all battery and data. If possible, download the app for Facebook and all these things rather than making use browser bookmarks.
(We also have to change the settings in the way, he has to call Android. Android phone may therefore also have different versions that your smartphone is a little different in the way of the process.)
New Delhi (India) Railway Station has recently been Wi-Fi enabled. Do you know that Wi-Fi at public places while your system and data-use are both at risk? What to do then? Wi-Fi at public places such as using some important settings in your computer and take advantage of this feature from the rest:
Hotel on, railway stations, coffee shops, etc. The public Wi-Fi networks are not as safe as you think. Among them is the password, even though you are a network share with the thousands which means that you are taking a risk. While working on the same network and steal someone's username and password to track what others are working on it, very easy to operate. Obviously, you do not want to take any chances. Here are some tell about the settings are any public Wifi networks while on the must-use, even if the network is password protected or not.
1. Turn off sharing
If you're at home, you file, folder, printer, or other things to share with others, but after coming over a public network like you to stop this kind of sharing so that no one can access your information. Follow this approach to the sharing of Windows:
- Start by going to the Control Panel Open the system.
- Network and Sharing Center, click on.
- Left side look up Change Advanced Sharing Settings. Click it.
- Come and give you a file and printer sharing is off. Network Discovery and Public Folder Sharing can also off.
2. Enable Firewall
Nowadays, most operating systems come with basic firewalls. Unnecessary local users to pry into your computer, it is a simple step to prevent. Use only will you have firewalls. Czech for Windows can thus: Control Panel> System and Security> Windows Firewall. Windows Firewall in the Control Panel option in many computers are seen. Make sure that your firewall is going on here. From here you can also decide which applications you want to access. The Control Panel> System and Security> Windows Firewall> Allow a program or feature go and edit it to your liking. Firewall does not mean that you have to keep on all escaped the danger, but it's always good to keep on.
3. Using "https" Enabled Sites For Transaction or Browsing
Facebook, Gmail is "https"(Means Hyper Text Transfer Protocol and "S" means SECURE)on its own as many sites, but while working on someone else's site, or sensitive data or passwords must take the time to look at the address bar put. S Make sure that there is at http. If s is not immediately log out. Advice is that if credit card or banking jobs are related to the public Wi-Fi networks Do not Use. Sensitive to such things would be better at home.
4. Turn off Wi-Fi if Not Using It
Safety of your computer every time you want and do not need the Internet to Use Wi-Fi to your place of. Every time without a Wi-Fi only if you keep the others, it increases the chances of your work Watch unsuspecting. Wi-Fi is off easy in Windows. For this you right-click on the wireless icon in the task bar and turn off Wi-Fi.
WordPress is, without a doubt, one of the most popular publishing platforms. More than 70 million websites from around the world use WordPress to run their blogs, including big names like The New York Times, CNN, Mashable, and eBay. WordPress is one of the easiest and most powerful content management systems (CMS) in existence today, but as with any widely used software, its popularity can make it a target for hackers. Fortunately, there are a few easy things you can do to secure your site from the majority of attacks. Here are seven WordPress security tips to keep in mind.
1. Get rid of the “admin” user.
If there is one golden rule of WordPress security, it is probably this: never use the default “admin” user. Obviously, on any WordPress site you’ll have at least one user with “Administrator” privileges, but make sure that username is something different than the default “admin.” By leaving the defaults in place, you make it easier for hackers to guess your password and gain access to your site.If you DO currently have a user named “admin” on your WordPress site, simply set up a new user with a unique name and password, and give them administrative access. Then, login as that new user and delete the old “admin” user. Be sure to attribute any old content that was posted by the “admin” user to your new username.
2. Use strong, unique passwords.
3. Simplify WordPress security with a powerful tool.
WordPress security is complex, and many of the more technical aspects are beyond what an average user might feel comfortable implementing themselves. Luckily, there are handy tools and security plugins built to simplify this process. Use a plugin like iThemes Security or BulletProof Security to secure your site from most attacks in just a few steps.4. Stay up to date.
One of the most important things you can do with any type of software, in terms of security, is keep it up to date. Software developers are constantly releasing security patches and updates, and WordPress is no exception. Make sure you’re running the latest version of WordPress, and keep plugins up-to-date. It typically only takes a few clicks and less than a minute to do so5. Keep plugins to a minimum.
The more bells and whistles, the more chances there are that something can break. Extra plugins, even inactive ones, can become a security risk if they become outdated. In the world of WordPress, typically when something goes wrong with your site, the problem can be traced back to an old plugin or multiple plugins that don’t play nice with each other. Delete unused plugins and keep the number of plugins you have installed on your WordPress site to just the essentials.6. Use a secure hosting company.
Your site is only as secure as the server it’s hosted on. Look for hosting companies that make security a top priority and offer support for the latest PHP and MySQL versions, as well as firewalls and intrusion detection systems. In the event that your site gets hacked, does your hosting provider offer support for that? If not, it may be time to look for another hosting company.7. Never use “admin” as your username
Earlier this year, there was a spate of brute-force attacks launched at WordPress websites across the web, consisting of repeated login attempts using the username ‘admin’, combined with a bunch of common passwords.If you use “admin” as your username, and your password isn’t strong enough (see #3), then your site is very vulnerable to a malicious attack. It’s strongly recommended that you change your username to something less obvious.
Until version 3.0, installing WordPress automatically created a user with “admin” as the username. This was updated in version 3.0 so you can now choose your own username. Many people still use “admin” as it’s become the standard, and it’s easy to remember. Some web hosts also use auto-install scripts that still set up an ‘admin’ username by default.
Fixing this is simply a case of creating a new administrator account for yourself using a different username, logging in as that new user and deleting the original “admin” account.
If you have posts published by the “admin” account, when you delete it, you can assign all the existing posts to your new user account.
8. Limit 'Login' Attempts
In the case of a hacker or a bot attempting a brute-force attack to crack your password, it can be useful to limit the number of failed login attempts from a single IP address.Limit Login Attempts does just that, allowing you to specify how many retries will be allowed, and how long an IP will be locked out for after too many failed login attempts.
There are ways around this, as some attackers will use a large number of different IP addresses, but it’s still worth doing as an additional precaution.
9. Disable file editing via the dashboard
In a default WordPress installation, you can navigate to Appearance > Editor and edit any of your theme files right in the dashboard.The trouble is, if a hacker managed to gain access to your admin panel, they could also edit your files that way, and execute whatever code they wanted to.
So it’s a good idea to disable this method of file editing, by adding the following to your wp-config.php file:
define( ‘DISALLOW_FILE_EDIT’, true );
10. Keep a "backup"
I can’t overemphasize the importance of making regular backups of your website. This is something that many people put off until it’s too late.Even with the best security measures at your disposal, you never know when something unexpected could happen that might leave your site open to an attack.
If that happens you want to make sure all of your content is safely backed up, so that you can easily restore your site to its former glory.
The WordPress Codex tells you exactly how to backup your site, and if that seems like too much hard work, you can use a plugin such as WordPress Backup to Dropbox to schedule regular automatic backups.
11. Try to avoid free themes
We’re confident in the quality and security of our free themes. As a general rule though, it’s better to avoid using free themes, if possible, especially if they aren’t built by a reputable developer.The main reason for this is that free themes can often contain things like base64 encoding, which may be used to sneakily insert spam links into your site, or other malicious code that can cause all sorts of problems, as shown in this experiment, where 8 out of 10 sites reviewed offered free themes containing base64 code.
If you really need to use a free theme, you should only use those developed by trusted theme companies, or those available on the official WordPress.org theme repository.
Note: The same logic applies to plugins. Only use plugins that are listed on WordPress.org, or built by a well-established developer.
Don’t Panic!
This may all sound pretty intimidating, especially if you’re a beginner. I’d like to point out that it’s not intended to scare anyone, it’s just important to discuss the topic of security regularly, as we want to make sure you stay one step ahead of the hackers!
You don’t have to do everything on this list (although it certainly wouldn’t hurt). Even if you just remove the ‘admin’ username and start using stronger passwords, your site will be that little bit safer.
Wednesday, 10 December 2014
Wednesday, 10 December 2014
- 0 Comments
1. Damini
This app was developed after the occurrence of December 16, 2012 Gangrep. If this app to your mobile, so any time of danger through the message will go to your registered numbers. Intermissive to these numbers will continue to be your GPS locations. Not only that, once activated app after it started to draw pictures of the place and then sends them to the registered numbers, are also saved on the cloud. Then the mobile phone or broke off, even if the mobile can be removed from the video and call detail.Size: 1.1 MB
Platform: Android
2. Circle of 6
This way, especially with college students has been designed keeping in mind, but it may prove Useful for all women. In case of any trouble, help is just a tap of the message will go to your friends. This app is also available in Hindi and also in Delhi helpline numbers are already feed.Size: 12 MB
Platform: Android
3. bSafe
This app will help you in the event of crisis or close family members can alert people. Family Members or to feed the numbers of people that are close to each click of the button message will play if required. Additionally, calls will go away on its own. The risk on mode and the number given to you by your GPS location can share.
Size: 5.9 MB
Platform: Android, iOS and BlackBerry
4. Scream Alarm!
The simplicity of this app is its USP. This app is going to loud noise. At the risk of any woman's scream like a button you can create loud. It gives voice to alert people nearby.Size: 951 KB
Platform: Android
5. Safeti Pin
This is a special way to ensure the safety of women try. It is a platform where people give information about places in the area, in terms of women who are not safe. People can share photos of the places on the app and you can rate them in terms of safety. App It also helps to know what the place is not safe at night or in the late afternoon of day.Size: 6.4 MB - 20.3 MB
Platform: iOS, Android
Download Link: Click me
6. Smart Shehar(City) Woman Safety Shield Protection
The app can be taken from the picture. As you press the emergency button with the picture already selected location information to emergency Contacts will go. Before sending it to lose your phone, so do not be upset. App will send the information automatically in a few seconds. The "Walk with Me" feature in real time before people decide to be able to track your movements.
Platform: Android
7. VithU: V Gumrah Initiative
The phone can be activated by pressing the power button, which is already set for emergency near Contakts "I am in danger. I need help. Please follow my location" message will continue to be updated on every 2 minutes with location.Platform: Android
8. Suspects Registry - FOR WOMEN
Platform: Android
9. Pukar-A Personal Safety App
Decide in advance of an emergency Contacts SMS alerts inter missive goes with the GPS location. The phone does not go unnoticed, no sound comes from the phone during the brightness of the screen is too low.Platform: Android
10. Women Safety Help Totem SOS
This mode can be selected according to the level of danger. Choose to feel safe green. If you are unable to decide, then choose yellow, the only fixed on your GPS location while Contacts something will pass. Red mode dial 100 numbers will be going to go to your location Contacts emergency. Also take photos and audio on the app will record every 10 seconds.Platform: Android
11. Raksha - Women Safety Alert
Go to the app without your location by pressing the volume button will go to the emergency Contacts. The mobile Internet is not going to go call the 100 number and the SMS will be lost.Platform: Android and IOS
12. iGoSafely - Personal Safety App
Once activated, the phone is rocking out or headphone Contakts it will alert you. Email and text message with the GPS location will be lost. Should be closed until then will continue every minute updates. GPS location of each alert message, Street Address (if available) and the audio recording is 30 seconds.Platform: Android
13. Smart24x7-Personal Safety App
It sends information to panic CContactsemergency alert, which is the condition of the audio recordings and photographs. These are referred to the police. The call center can track the user's primary contact movement.Platform: Android, iOS, Windows and Blackberry
14. Women Safety Secured
This app takes howling danger signals and emergency Contacts as the location and sends a text message.Platform: Android
15. Women's Safety App
In this app Shake and Alerts' feature in which to blow on to the phone will run on the emergency alert Contacts. It alerts you to look elsewhere shock a phone to run on, so you can determine the severity of shock.Platform: Android
Download: Click me
Friday, 21 November 2014
Friday, 21 November 2014
- 0 Comments
A wave of delight has started to sweep away 600 million users of the most popular messaging app WhatsApp. The company has released an update to its Android app that will have a strong end-to-end encryption by default. What does this mean for you? Scroll down to know.
The recent partnership of WhatsApp with Open Whisper Systems is nothing but good news for users who might have questioned the security or privacy of their WhatsApp messages. In its latest update for Android, the company has integrated the TextSecure encryption protocol.
As per reports, WhatsApp is by far the largest platform that has deployed end-to-end encrypted communication in history.
For those who would like to know about this development and how the TextSecure protocol works, here are some useful sources you can gather knowledge from:
https://whispersystems.org/blog/whatsapp/
http://wrd.cm/1xTD5aY
http://bit.ly/1oZqb9D
http://on.mash.to/1qlBo5u
Now that your WhatsApp messages are encrypted, do you feel safer about your privacy? Do leave your comments below!
The recent partnership of WhatsApp with Open Whisper Systems is nothing but good news for users who might have questioned the security or privacy of their WhatsApp messages. In its latest update for Android, the company has integrated the TextSecure encryption protocol.
What Does this Mean?
With the TextSecure encryption protocol in place, your messages are end-to-end encrypted. In other words, your messages can be read only by you and the receiver. So, this eliminates the risk of a hacker or anyone decrypting and reading your messages while it is traveling to the recipient’s device.This Encryption Technology is Stronger than What Facebook and Google Uses
While our emails and messages on Facebook and Google are encrypted, they can still be read by authorities if permitted by law. TextSecure, on the other hand, ensures that the message is only read by the sender and the recipient, and no one else, nada. So, even if the government compels WhatsApp to share your data, there is no way they can do it. Hence, it can be safely said that this is the strongest security feature any major texting app has ever offered.As per reports, WhatsApp is by far the largest platform that has deployed end-to-end encrypted communication in history.
Limitations
As of now, the TextSecure protocol only encrypts your text messages and not group chats, images and videos. However, Open Whisper Systems has stated in a blog post that they will be rolling out support even for these issues in the near future.Do you have to Activate the TextSecure Protocol on your WhatsApp?
You do not have to do anything to turn this security feature ON, as it would be enabled by default. Also, this will not affect the way you use the WhatsApp in anyway. As Open Whisper Systems’ co-founder Moxie Marlinspike says it, “Ordinary users won’t know the difference, it’s totally frictionless.”For those who would like to know about this development and how the TextSecure protocol works, here are some useful sources you can gather knowledge from:
https://whispersystems.org/blog/whatsapp/
http://wrd.cm/1xTD5aY
http://bit.ly/1oZqb9D
http://on.mash.to/1qlBo5u
Now that your WhatsApp messages are encrypted, do you feel safer about your privacy? Do leave your comments below!
Subscribe to:
Posts (Atom)