" encryption Archives - Page 5 of 5 - LuxSci

Posts Tagged ‘encryption’

Master Password Encryption in FireFox and Thunderbird

Friday, February 27th, 2009

firefox-logoIf you are allowing Mozilla FireFox or Thunderbird to remember passwords to web sites and/or email accounts in their Password Manager tool, you should know that these passwords are all stored in a plain text file (base64 encoded) on your computer’s disk drive.  This file is accessible to anyone with administrative access to your computer.  If you have any concerns about the possibility of other people accessing your computer and this gaining easy access to copies of the passwords that you are using, you really need to employ the “Master Password” feature of these programs.

Read the rest of this post »

Enforcing Email Security with TLS when Communicating with Banks

Monday, November 3rd, 2008

LuxSci has had many requests from clients who have to communicate with various banks and other security-conscious organizations asking that LuxSci “enforce the encryption of email when sent to those organizations’  email servers via TLS”.  This is such a common request, that I wanted to explain what it means, why it is good, how LuxSci does this by default, and the extra step that LuxSci can take to lock down things even more for you.

Read the rest of this post »

Content-Driven Automatic Email Encryption

Saturday, June 30th, 2007

LuxSci’s SecureLine end-to-end email encryption service now allows you to set up rules to automatically encrypt only certain messages based on keywords, phrases, and regular expressions that appear within the content.

Sending Ultra Secure Messages Just Got Easier!

Saturday, December 17th, 2005

SecureLine-licensed users can add two new options to the cutting edge features of SecureLine email so that users can send and receive secure email messages directly from any email client without additional software to install!

  • SecureLine Automatic Outbound Encryption will automatically encrypt email messages sent from any email program if the recipient(s) are other SecureLine users or if information on how to secure their messages is stored in the sender’s address books(s). Messages that cannot be encrypted due to lack of information about the recipient, can be sent normally [insecurely] or not at all. Additionally, the sender can be notified about what happened and why. Combined with the use of Enterprise WebAide shared address books, it is easy to share recipient encryption information (like public keys or Escrow security questions and answers) across all users in your account.
  • SecureLine Automatic Inbound Decryption allows you to automatically:
    • decrypt secure messages to you upon arrival at LuxSci,
    • apply additional filters, if required, and,
    • store as unencrypted messages in your email folders.

    This allows you to access these messages (securely over SSL) from any email client using POP or IMAP (as well as from WebMail).Both automatic encryption and automatic decryption can be configured on an account-wide, domain-wide, and per-user basis. Use of these features also enables “forced use of SSL” which will require all connections to email data via POP, IMAP, SMTP, and WebMail to be secure.

Email and Text Messaging Security in the Wired and Wireless Worlds

Thursday, August 1st, 2002

International Lecture by Dr. Erik Kangas

“Internet email, Internet instant messaging, and mobile short text messaging are related in that they enable communications by pushing messages from sender to recipient over generally insecure networks. The security issues and vulnerabilities inherent in all three modes of communication are also very similar. This talk will review standard security threats associated with electronic messaging in general, and their common remedies including symmetric and asymmetric key encryption, digital signatures, and message authentication codes. Next, a detailed exposition of the security vulnerabilities inherent in all phases of Internet email delivery will be examined and solutions such as S/MIME, Authentication, and Transport Layer Security (TLS) will be discussed. After a brief look of the serious issues involved with public Instant Messaging services such as AOL Instant Messenger, Yahoo! Messenger, and ICQ, the Short Messaging System (SMS) over the Global System for Mobile Communications (GSM) will be examined. We will review the current security protocols used by GSM and identify the vulnerabilities to SMS. Finally, several ways that GSM or SMS could be extended or modified to ensure the security and privacy of SMS messages, even in a multi-vendor mobile environment, will be proposed.”

Read the rest of this post »