How To Avoid Identity Theft During This Tax Season?

How To Avoid Identity Theft During This Tax Season?

The time is here to file taxes and if you use the Internet to get it done there are some very important best practices for preventing identity theft this season. Cyber-criminals are especially in favor of the tax season because the documents you are required to submit contain highly sensitive information about your identity and finances, such as, your name, physical address, banking details, loan details, employee details, etc, and of course, your social security number. Don’t let any of them fall into the wrong hands! By implementing the best practices we share in this article you can make sure that your confidential details remain protected.

Read More

Data Privacy Day 2014: East-Tec Becomes A Champion To Help Raise Awareness

Data Privacy Day 2014: East-Tec Becomes A Champion To Help Raise Awareness

As each of the last few years brought news of serious data privacy issues involving some of the biggest companies in the world, along with a huge number of their affected customers, the importance of protecting one’s data privacy is slowly becoming recognized. Unfortunately, 2013 wasn’t short of such news; in fact, it offered some of the most jaw-dropping reports to date, such as, the Snowden revelations and the Target issue. East-Tec would like to highlight that in the face of such events, the usual, anti-virus based privacy protection, without permanent removal of one’s PC and Internet activity traces, is simply not reliable anymore.

Read More

The Encryption Series Part 1: What Is Encryption And Why You Need To Use An Encryption Software

The Encryption Series Part 1: What Is Encryption And Why Do You Need To Use An Encryption Software?

I know, encryption is a word that sounds like Superman is talking to Ironman in the 22nd century on a faraway planet. But in fact, encryption has been used as a security measure since ancient times, first by the Egyptians, the Israelites and the Mayans, then the Greeks and the Romans. It is the technique of turning plain text into unintelligible text so that its original meaning becomes hard or impossible to figure out unless one knows what way it was altered. A Greek king could, for instance, send a message to his prime minister, but instead of saying “Kill the commander”, he could move each letter of the message one forward in the alphabet. So the encrypted message would read as follows: “Ljmm uif dpnnboefs”. Sounds pretty much like nonsense, doesn’t it? But it does the job, doesn’t it?

Read More

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

Ever since the NSA Prism activities have been brought to our attention, the the need for keeping our data private by encrypting it has become more relevant than ever. Ironically enough, a recent statement by RSA, an Internet security firm, revealed that one algorithm its products use, might contain an NSA backdoor. You can read the related  BBC article here.

Read More