" encryption Archives - Page 5 of 5 - LuxSci

Posts Tagged ‘encryption’

Encrypting Sent Email — An Often Overlooked Part of End-to-End Encryption

Wednesday, September 26th, 2012

You are proactive and security conscious.  You use end-to-end encryption software, like PGP or S/MIME or LuxSci SecureLine, to send your sensitive messages to their destinations, ensuring that the message content is encrypted the entire way … because otherwise, email is just plain insecure.

Oh – but what about the copies of these messages saved to your “Sent Email” folders?  Are they encrypted or secure?  Should they be?

Read the rest of this post »

Enforcing Email Security with TLS when Communicating with Banks

Monday, November 3rd, 2008

LuxSci has had many requests from clients who have to communicate with various banks and other security-conscious organizations asking that LuxSci “enforce the encryption of email when sent to those organizations’  email servers via TLS”.  This is such a common request, that I wanted to explain what it means, why it is good, how LuxSci does this by default, and the extra step that LuxSci can take to lock down things even more for you.

Read the rest of this post »

Content-Driven Automatic Email Encryption

Saturday, June 30th, 2007

LuxSci’s SecureLine end-to-end email encryption service now allows you to set up rules to automatically encrypt only certain messages based on keywords, phrases, and regular expressions that appear within the content.

Sending Ultra Secure Messages Just Got Easier!

Saturday, December 17th, 2005

SecureLine-licensed users can add two new options to the cutting edge features of SecureLine email so that users can send and receive secure email messages directly from any email client without additional software to install!

  • SecureLine Automatic Outbound Encryption will automatically encrypt email messages sent from any email program if the recipient(s) are other SecureLine users or if information on how to secure their messages is stored in the sender’s address books(s). Messages that cannot be encrypted due to lack of information about the recipient, can be sent normally [insecurely] or not at all. Additionally, the sender can be notified about what happened and why. Combined with the use of Enterprise WebAide shared address books, it is easy to share recipient encryption information (like public keys or Escrow security questions and answers) across all users in your account.
  • SecureLine Automatic Inbound Decryption allows you to automatically:
    • decrypt secure messages to you upon arrival at LuxSci,
    • apply additional filters, if required, and,
    • store as unencrypted messages in your email folders.

    This allows you to access these messages (securely over SSL) from any email client using POP or IMAP (as well as from WebMail).Both automatic encryption and automatic decryption can be configured on an account-wide, domain-wide, and per-user basis. Use of these features also enables “forced use of SSL” which will require all connections to email data via POP, IMAP, SMTP, and WebMail to be secure.

Email and Text Messaging Security in the Wired and Wireless Worlds

Thursday, August 1st, 2002

International Lecture by Dr. Erik Kangas

“Internet email, Internet instant messaging, and mobile short text messaging are related in that they enable communications by pushing messages from sender to recipient over generally insecure networks. The security issues and vulnerabilities inherent in all three modes of communication are also very similar. This talk will review standard security threats associated with electronic messaging in general, and their common remedies including symmetric and asymmetric key encryption, digital signatures, and message authentication codes. Next, a detailed exposition of the security vulnerabilities inherent in all phases of Internet email delivery will be examined and solutions such as S/MIME, Authentication, and Transport Layer Security (TLS) will be discussed. After a brief look of the serious issues involved with public Instant Messaging services such as AOL Instant Messenger, Yahoo! Messenger, and ICQ, the Short Messaging System (SMS) over the Global System for Mobile Communications (GSM) will be examined. We will review the current security protocols used by GSM and identify the vulnerabilities to SMS. Finally, several ways that GSM or SMS could be extended or modified to ensure the security and privacy of SMS messages, even in a multi-vendor mobile environment, will be proposed.”

Read the rest of this post »