" security Archives - Page 8 of 8 - LuxSci

Posts Tagged ‘security’

SecureLine Email Encryption Enhancements

Friday, April 6th, 2007

LuxSci has made significant improvements to the SecureLine end-to-end email encryption service that make it much easier to use. These include

Read the rest of this post »

LuxSci Announces SecureLine Email Communication Service

Tuesday, September 13th, 2005

BOSTON (Sept. 13, 2005)- Lux Scientiae, Incorporated, (LuxSci) a Boston-based Secure Internet Services Provider, today announced the release of its newest service, SecureLine.

SecureLine allows its users to easily and securely communicate with anyone who has an email address, no matter what kind of email software or service that correspondent has, or how insecure that correspondent’s current email services are.

Read the rest of this post »

Email and Text Messaging Security in the Wired and Wireless Worlds

Thursday, August 1st, 2002

International Lecture by Dr. Erik Kangas

“Internet email, Internet instant messaging, and mobile short text messaging are related in that they enable communications by pushing messages from sender to recipient over generally insecure networks. The security issues and vulnerabilities inherent in all three modes of communication are also very similar. This talk will review standard security threats associated with electronic messaging in general, and their common remedies including symmetric and asymmetric key encryption, digital signatures, and message authentication codes. Next, a detailed exposition of the security vulnerabilities inherent in all phases of Internet email delivery will be examined and solutions such as S/MIME, Authentication, and Transport Layer Security (TLS) will be discussed. After a brief look of the serious issues involved with public Instant Messaging services such as AOL Instant Messenger, Yahoo! Messenger, and ICQ, the Short Messaging System (SMS) over the Global System for Mobile Communications (GSM) will be examined. We will review the current security protocols used by GSM and identify the vulnerabilities to SMS. Finally, several ways that GSM or SMS could be extended or modified to ensure the security and privacy of SMS messages, even in a multi-vendor mobile environment, will be proposed.”

Read the rest of this post »