Hackers

Easy to Get Started with eSignatures, Secure File Sharing and Email Encryption

March 22, 2020 / in Blog / by Zafar Khan, RPost CEO

Today’s New Triple Play (without baseball) Last week everything was as fancy as an iPhone 11. Being on a business conference call with the sounds of a baby happily chirping in the background was distracting. Those good old days (back in February) when anything less than elegance or perfection was disturbing.

Free and Easy Email Encryption and eSignatures

April 05, 2020 / in Blog / by Zafar Khan, RPost CEO

The Government is Dropping Money Out of Helicopters. FOMO. The Government is Dropping Money from Helicopters. And every American business is trying to catch some of it, any of it, and fast. Surely there won’t be enough to support payroll for every small business in America for 2-3 months. What then? Two trillion dollars sounds […]

With Advanced Encryption Technology, your Emails are more than Protected!

January 08, 2021 / in Blog / by Zafar Khan, RPost CEO

Your Smart Home May Need to Go Back to School We’ve been living in/with smart homes for many years now. You can use Alexa or Google Home to dim lights, play music throughout your house and reorder milk when the time comes. And this is just the beginning.

The Biggest Threat to Your Online Security Could Be Your Password

May 11, 2016 / in Blog / by Zafar Khan, RPost CEO

Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the […]

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.

DNC Leak: Russian Hackers or Inside Job?

July 26, 2016 / in Blog / by Zafar Khan, RPost CEO

…and does it change the result? Who is responsible for the recent Democratic National Committee (“DNC”) hack and resulting emails published on WikiLeaks? Russian hackers are suspected and the FBI is investigating, but Russia adamantly denies involvement. The hackers could be from the same group who stole DNC’s oppositional research about Republican Presidential nominee Donald Trump in […]

Shadow Brokers Release NSA Hacking Tools to The Public

August 18, 2016 / in Blog / by Zafar Khan, RPost CEO

A hacking group called Shadow Brokers has reportedly stolen powerful hacking tools from the Equation Group, a hacking group believed to be NSA-backed and responsible for many of the largest state-level hacks in history. On Saturday, Shadow Brokers released a subset of these tools to the public, which several former employees of the NSA’s hacking division, known as […]

Tips for Staying Cyber Safe on The Road

August 26, 2016 / in Blog / by Zafar Khan, RPost CEO

Next week marks the last official week of summer vacation. It is likely also the beginning of your “back to work” business travel. Business travellers should note these specific precautions when conducting business transactions from the road, especially if you are likely to be more focused on the speed of getting things done rather than […]

Advanced Email Security, Requiring Smarter Email Delivery Systems for Important Email

April 22, 2019 / in Blog / by Zafar Khan, RPost CEO

Not All Email Tracking is Created Equal If you are sending a zillion newsletter or marketing emails, sure, email marketing platforms make it easy to manage your email list; and many do provide some basic tracking information.

Internet Cameras and Masking Tape

December 09, 2016 / in Blog / by Zafar Khan, RPost CEO

Earlier this year, Mark Zuckerberg, CEO of Facebook, unintentionally revealed (in a photo he posted to his Facebook account) that he covers up the webcam and audio port on his laptop. He literally has a small piece of masking tape over the pea-sized camera lens and another one on the audio port where headphones plug in. […]