Read the Latest News and stay updated regarding Cybersecurity,
Encryption, Privacy, Safe solution to communicate across Internet.

A Wall Street Journal (WSJ) article written by Shane Shifflett and Coulter Jones, dated 17 May 2018,  reported that a WSJ analysis of 1,450 ICOs currently underway found 271, about 20%, were fraudulent and had already consumed more than $1.0 Billion USD of investor money. The “red flags” the article points out include, “plagiarized investor documents, promises of guaranteed returns and missing or fake executive teams.

The concept of a backdoor is pretty simple. When a company develops a piece of security software or hardware, the government puts pressure on the developers to include a way for them to get around the security aspects of the product. The rationale is that bad actors and terrorists are using secure, encrypted hardware and software to plan and implement their attacks. If the law enforcement arms of the government cannot “crack the code” being used, they are limited in their ability to prevent and investigate these attacks.

There is an old saying where I come from that goes, “You can’t be too rich or too beautiful.” Well, in today’s digital world I think it needs to include, “You can’t be too careful online or have too much security.” Time for Facebook (FB) users to take this new advice to heart as several Chrome extensions promoted on FB have been found to install malicious code in the user’s browsers.

Users of the Signal encryption application for Windows and Linux need to patch their software as soon as possible. According to an article in Hacker News, a security researcher in Argentina discovered a bug in the end-to-end encryption software that allows bad actors to inject malicious code into a message and have it execute on the target machine without action by the recipient.

If you want to use digital technology safely and fearlessly you need some serious security. This is true whether you are protecting your home network or that of a major corporation. Layer upon layer of security is being be combined to build the strongest defense possible. Firewalls, anti-virus software, sandboxed operations, multi-factor user identification, and more are being used. But, like the castles of old, there is always a weak point that the barbarians can exploit to breach the defenses.

For Darwinian theory adherents, you would think such a pairing unlikely in the extreme as Linux was spawned specifically to combat the monopolistic reaches of major OS providers like Microsoft (MS). But, according to an article in Hacker News, the Redmond, WA giant has built its own Linux kernel to power its new integrated security chip/cloud services offering called Azure Sphere.

As we reported in an earlier post, hackers found a method for hacking into Intel processors giving them access to sensitive information like passwords and personal information. Called Spectre and Meltdown, these vulnerabilities were not reported for several months as Intel worked to verify and patch them.

Do You Have a Tip or a suggestion for an interesting topic? Tell Us About It.


We envision a world where all digital communications are safe and private. We are dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Stay Updated

Enter your e-mail and we will keep you updated with our latest news.

Am I a Robot?