How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.

Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?

Read More

Get Your Head Out Of The Clouds And Use Encryption To Look After Your Data

Get your head out of the clouds and use encryption to look after your data

The recent and unfortunate case of Amazon S3 data exposure drew our attention, once again, to some of the potential risks of data handling even cloud storage can not prevent. An analysis conducted by Rapid7 revealed that a misconfiguration issue left nearly 2000 S3 buckets exposed. Including potentially sensitive data.

We can see from that example that accidents can happen even when companies like Amazon look after your data. This is not to say you should quit using cloud services. They usually do provide a great and highly secure way for data storage and handling. But there are some extra measures you could, and should take to protect your data stored in the cloud.

Read More

The East-Tec Security Family Has Two New Members: InvisibleSecrets and SafeBit

The East-Tec Security Family Has Two New Members: InvisibleSecrets and SafeBit

Today we’re pleased to offer you two new members of our security family: east-tec InvisibleSecrets and east-tec SafeBit. We have been creating privacy and security products and solutions for the last 15 years, since the end of 1997. Today we are expanding our product line with two encryption and steganography products, designed to prevent unwanted people from reading your private documents and files.

East-Tec has acquired these two top class security products from Neobyte Solutions, which has been developing and improving them since 1999. Eugen Malita, our CEO, explains: “We’re happy to provide our customers with top-class encryption and steganography software. We have received a lot of requests from them, so we hope we are making their wishes come true!”

Read More

10 Ways To Protect Your Privacy And Identity On A Windows Computer

10 Ways To Protect Your Privacy And Identity On A Windows Computer

Working with personal data on a computer means your privacy and identity need to be protected. Here are a few basic tips that will help you stay out of trouble.

1. Password protect all your Windows accounts

Passwords provide the first layer of protection against hackers or if you are to share a computer with others.The list of DOs and DON’Ts below guarantees enhanced protection. Keep them in mind when creating and using passwords:

Read More

File Encryption And Disk Encryption For Maximum Security

File Encryption And Disk Encryption For Maximum Security

As you already know, we offer two of our products – east-tec InvisibleSecrets (a file encryption software) and east-tec SafeBit (a disk encryption software) as a special priced bundle, called the Encryption Pack. Many have asked us why they need two encryption programs, and how are they different.

InvisibleSecrets is a file encryption / steganography program, and a security suite. Since it covers the stand-alone file encryption it is best used for file transmissions (if you want to securely send files to someone). It has many tools for this purpose:

Read More