Uncategorized

Authy Privacy/Security Review

Posted on

Authy is a QR-based 2-factor authentication alternative to Google Authenticator backed by Twilio. Perhaps one of its biggest differences is the ability to be able to deploy Authy across multiple devices, including a computer. This does pose a risk in that it gives you two attack surfaces rather than one, but it also gives you […]

Encrypted Chat

Signal Security/Privacy Review

Posted on

Signal is maintained by a non-for-profit dedicated to privacy, and powered by the open source and audited Signal Protocol. You can make audio and video calls on the app, though you can only text on group for now. Signal is acclaimed by several prominent figures in the cybersecurity space including Edward Snowden and Bruce Schneier. […]

Encrypted Chat

Keybase.io Security/Privacy Review

Posted on

Keybase.io started as a repository for identities and keys that allowed for an easier interface for sending and receiving encrypted messages. You can form groups here and chat easily in an encrypted end-to-end fashion. This is unlike Slack, where conversations are not encrypted end-to-end by default. Functionality-wise, it acts as a slightly less richer and […]

Encrypted Chat

Whatsapp Security/Privacy Review

Posted on

Most people don’t think of WhatsApp for its encryption standards, but WhatsApp does have end-to-end encryption unlike its other Facebook counterpart, Messenger. It might be a low-cost way for all of your employees to switch from more insecure and perhaps more costly SMS messages to WhatsApp messages, as many of them may already have the […]

CyberSecurity Guides/Courses

How To Work From Home Securely Without Decreases In Performance: A Definitive Guide

Posted on

Remote working is in vogue these days due to the lockdowns that have come from the COVID-19 pandemic. Yet, as workers shift to their homes, new cybersecurity issues come into play. By moving critical data and infrastructure away from the office, companies are inadvertently exposing themselves to increased cybersecurity threats.  This is a dual threat […]

CyberSecurity Threats

Cybersecurity Threats Report: May 19th, 2020

Posted on

Every week, CyberSecure compiles the list of the most recent vulnerabilities on the National Vulnerability Database, uses social signals and tech types to categorize which ones might be the best to surface for average users and businesses. While this condensed list is useful in order to fully contextualize solutions and the urgency of applying patches […]

CyberSecurity Threats

Cybersecurity Threats Report: May 12th, 2020

Posted on

You probably don’t have the time to look up the latest, most urgent security vulnerabilities that might affect you or your business. This is meant to be a weekly rundown of the most relevant CVE vulnerabilities/cybersecurity threats that might be the most urgent for you. CVEs stand for common vulnerabilities and exposures. Each contains an […]

Vulnerabilities

CVE-2020-3765 (Adobe After Effects): Possible Backdoor

Posted on

Description The CVE-2020-3764 vulnerability is a critical security vulnerability affecting Adobe After Effects. This is the most severe categorization for security vulnerabilities. Adobe After Effects is paid software for video editing, often used to splice video clips together into a coherent media piece and to add different effects. It can be used in combination with […]