Authenticating Signatures in Days of Yore

Did you know that Digital Signatures was first implemented in 1988? It implemented the RSA cryptographic algorithm, which is still being developed and used today. Even so, not too long ago, the corporate world was still using rubber stamps and wet ink signatures to legalise documents. They would even share the authorisation process by sharing the physical stamp with their employees,

Read More
Don’t Get Hooked By Phishing

Don’t Get Hooked By Phishing

Phishing is a kind of social engineering attack. Often it is a low-tech attack as opposed to high-tech attacks like security system hacking or password hacking. These malicious attacks employ psychological tricks to lead users into divulging sensitive information or unknowingly providing security access. The most common form of social engineering is email phishing. Steps perpetrators use: 1. Casting a wide

Read More