Poker playing in the Hall of Mirrors? Don’t let others look into your cards!

British intelligence agencies have for years spied on the communications between lawyers and their clients. So how to protect lawyers and their clients?

Read more

Confidence in US Service Providers' Security down to just 2%

The German daily newspaper "Die Welt" recently reported in an article on findings taken from the Cyber Security Study that the Allensbach Institute has carried out on behalf of the Deutsche Telekom subsidiary T-Systems. The study shows a high degree of scepticism among executives about using US IT companies and providers of cloud services.

Read more

The Danger of exchanging Data using a USB-stick

People and companies who want to exchange data usually are confronted with two basic problems. A: Using a proper email encryption system can be very complicated. B: Sending large files via email is often limited by the provider, software or encryption system. The alternative is to use a USB stick. But this isn’t without risk as recent developments show.

Read more

Safe Exchange of Sensitive Data

The US-American Internet pioneer and book author Jaron Lanier has received the German Book Trade Peace Prize. Lanier criticizes the recent developments of the online world and the impending loss of control over freedom and personal data connected to them.

Read more

The Cost of Cyber Attacks for Companies

Economic consequences of cyber attacks can cost firms up to several hundred thousand U.S. dollars. While there is a difference in the total amount between small and medium enterprises and big companies, it poses an economic threat that should not be underestimated by either one. But what are the expected financial damages and how can Cryptshare help minimizing them?

Read more

Declining Trust in Online Data Safety can pose a Business Risk

Recent studies have shown that Internet users are increasingly unsettled and mistrusting when it comes to online data safety. With an increasing number of digital espionage incidents consumers lose their trust. This is not only bad for the Internet user but also holds a business risk for enterprises that have to handle and process customer data electronically.

Read more

Industrial Espionage on Demand

When it comes to data security not only hackers and other criminals are potential threats for companies. The United States run an agency where national companies can request espionage of foreign companies when competing for public project for example. This so called Advocacy Center of the U.S. Department of Commerce serves as an interface between US-American intelligence services and companies. Its purpose is to improve the competitive situation for domestic industries internationally. While this can be seen as a positive approach for American companies it poses a threat for all foreign competing industries and calls for better protection of corporate communication and data.

Read more

Cryptshare Security Bulletin IX/2012-1EN

 

On Monday, 17.09.2012, the German Federal Office for Security in Information Technology (BSI) issued a press release in which it warns about a security vulnerability in Microsoft Internet Explorer. Affected are the versions 7 and 8 running on Windows XP and versions 8 and 9 on Windows 7. As the BSI also states there is no security fix available from the manufacturer yet. However the attack code required for exploiting this vulnerability is already available on the internet. For this reason, the BSI assumes a rapid, wide-scale exploitation. Even an accidental visit to a malicious website may lead to an arbitrary code being executed with the privileges of the user on the system.

In their security bulletin dated 17.09.2012 Heise Online (www.heise.de) explains in more detail how attackers may exploit the security leak. According to Heise it may come to a complete loss of control over the affected computer.

If you do not want to use Internet Explorer until a fix is available for this vulnerability, we advise to alternatively use Firefox (version 2 or higher) or Safari (version 3 or higher) for file transfers via Cryptshare. There are no restrictions in functionality of Cryptshare when using one of these alternative browsers.

 

Read more

Topics

About this blog

With our software Cryptshare we enable our customers to share e-mails and files of any size securely in an ad-hoc way with a detailed audit trail and a strong ROI.

On our blog we write about email encryption, cybercrime, security gaps, malware, data protection and more. In short, anything about data security.

Follow us