Confidence in US Service Providers' Security down to just 2%

The German daily newspaper "Die Welt" recently reported in an article on findings taken from the Cyber Security Study that the Allensbach Institute has carried out on behalf of the Deutsche Telekom subsidiary T-Systems. The study shows a high degree of scepticism among executives about using US IT companies and providers of cloud services.

Read more

The Danger of exchanging Data using a USB-stick

People and companies who want to exchange data usually are confronted with two basic problems. A: Using a proper email encryption system can be very complicated. B: Sending large files via email is often limited by the provider, software or encryption system. The alternative is to use a USB stick. But this isn’t without risk as recent developments show.

Read more

Safe Exchange of Sensitive Data

The US-American Internet pioneer and book author Jaron Lanier has received the German Book Trade Peace Prize. Lanier criticizes the recent developments of the online world and the impending loss of control over freedom and personal data connected to them.

Read more

The Cost of Cyber Attacks for Companies

Economic consequences of cyber attacks can cost firms up to several hundred thousand U.S. dollars. While there is a difference in the total amount between small and medium enterprises and big companies, it poses an economic threat that should not be underestimated by either one. But what are the expected financial damages and how can Cryptshare help minimizing them?

Read more

Shellshock Bug: Fix available

The recently detected “Shellshock” bug in Linux operating systems could affect Cryptshare 2 Servers. A bugfix is available now to resolve the issue which should be applied to all Cryptshare 2 and Cryptshare 3 Hardware and Virtual Appliances.

Read more

Declining Trust in Online Data Safety can pose a Business Risk

Recent studies have shown that Internet users are increasingly unsettled and mistrusting when it comes to online data safety. With an increasing number of digital espionage incidents consumers lose their trust. This is not only bad for the Internet user but also holds a business risk for enterprises that have to handle and process customer data electronically.

Read more

Industrial Espionage on Demand

When it comes to data security not only hackers and other criminals are potential threats for companies. The United States run an agency where national companies can request espionage of foreign companies when competing for public project for example. This so called Advocacy Center of the U.S. Department of Commerce serves as an interface between US-American intelligence services and companies. Its purpose is to improve the competitive situation for domestic industries internationally. While this can be seen as a positive approach for American companies it poses a threat for all foreign competing industries and calls for better protection of corporate communication and data.

Read more

S/MIME vs PGP - The right way to secure e-mail communication?

Despite increasing awareness of the issue in the media, the rate of encrypted e-mails being sent is dropping. S/MIME vs PGP - What is the right approach to protect electronic communication?

Read more

Cryptshare for Notes unter "den besten Tools für Lotus Notes"

Cryptshare Security Bulletin IX/2012-1EN


On Monday, 17.09.2012, the German Federal Office for Security in Information Technology (BSI) issued a press release in which it warns about a security vulnerability in Microsoft Internet Explorer. Affected are the versions 7 and 8 running on Windows XP and versions 8 and 9 on Windows 7. As the BSI also states there is no security fix available from the manufacturer yet. However the attack code required for exploiting this vulnerability is already available on the internet. For this reason, the BSI assumes a rapid, wide-scale exploitation. Even an accidental visit to a malicious website may lead to an arbitrary code being executed with the privileges of the user on the system.

In their security bulletin dated 17.09.2012 Heise Online ( explains in more detail how attackers may exploit the security leak. According to Heise it may come to a complete loss of control over the affected computer.

If you do not want to use Internet Explorer until a fix is available for this vulnerability, we advise to alternatively use Firefox (version 2 or higher) or Safari (version 3 or higher) for file transfers via Cryptshare. There are no restrictions in functionality of Cryptshare when using one of these alternative browsers.


Read more


About this blog

With our software Cryptshare we enable our customers to share e-mails and files of any size securely in an ad-hoc way with a detailed audit trail and a strong ROI.

On our blog we write about email encryption, cybercrime, security gaps, malware, data protection and more. In short, anything about data security.

Follow us