Blog
This SMTP Injection in G Suite Allows Google Email Domains to be Spoofed
A lot can be said about Gmail relying on outdated and often unsecure protocols. For instance, we’ve already covered here on our blog how hackers were able to bypass Google’s 2FA security back in 2018. That’s just one example. One new example of this was discovered by Zohar Shachar in his blog post. Shachar is an ethical (whitehat) […]
November 30, 2023
What is a Business Email Compromise and How to Protect Against it?
Email fraud can take different forms. Email security mistakes cost businesses billions of dollars per year. One particularly effective and dangerous type of email scam is the business email compromise attack, or BEC attack. What is a BEC attack? A BEC attack is a type of email scam in which the attacker targets an organization’s email account and […]
Email Cyber Attacks are on the Rise. Protect Yourself, Don’t Wait to Get Hacked
Email cyber attacks are nothing new. They have been around in one form or another almost since email was first introduced. The first recorded instance of a spam email can be traced back to 1978 (the first email was sent in 1970, so just 8 years prior) and it was a message from Digital Equipment […]
How CTemplar Can Help Journalists in Their Work?
The journalist profession is full of danger. According to the UNESCO Observatory of Killed Journalists, 1402 journalists have been killed since 1993. In the last decade (2010-2020), there have been 923 journalists around the world who have lost their lives. We believe that a secure email service for journalism can do a lot to prevent that. […]
What is a CEO Fraud and How to Prevent it?
Today companies and their employees need to be very aware of potential online scam dangers. Cybercriminals have become very sophisticated not just regarding the technologies and software they are using, but also in being better able to impersonate legitimate entities and getting sensitive information from their victims. One email scam where this is best shown […]
What is a Pharming Attack and How to Prevent it?
Hackers and scammers have become very proficient at what they do to the level that very often their victims are not even aware that they are sent to a fake website. Such a website is called a pharming website. Pharming is an Internet scam similar to the better-known phishing, but with some notable differences (of which […]
Is Your Session Hijacked? How to Prevent Session Hijacking?
Every time you log in or access a website or server on the network you initiate what is called a “session”. Sessions represent a connection between the user’s computer or other device and a server and are what makes the exchange of information and data between two computers on the network possible. Most websites use […]
Encrypted Email Frequently Asked Questions
How do I report a suspicious email? Identifying a malicious or phishing email on time is important to protect your email and its data. The process of reporting a phishing or otherwise suspicious email largely depends on the email service you are using. To report a suspicious email on Gmail, for example, open the email in […]
Russian Hackers Attack Exim Mail Transfer Agent
As the November elections in the United States draw closer so do the fears of a repeated 2016 scenario when Russian hackers interfered in the presidential elections. It seems those worries have only gotten more fuel following the U.S. National Security Agency’s (NSA) advisory issued on 28th May. According to the NSA’s advisory, a group of […]
5 Useful Tips to Prevent Email Hacking
Electronic mail is an incredibly useful communication method, but it does come with certain risks. In 2019, according to Verizon’s 2020 Data Breach Investigation Report, 94% of malware was delivered by email. Email hacking in one form or another is an all-present danger, so it’s more than useful to know how to increase safety to mail […]
Am I Being Tracked by the Government?
2013 was a pivotal year for online privacy. It’s not that people weren’t thinking about Internet privacy problems by then, but it took Edward Snowden’s NSA leaks to really open most people’s eyes on how their government might by tracking them online. Of course, a lot has been said about Snowden and NSA, but there […]
Why End-to-End Encrypted Data is Important to Protect Free Speech
This Wednesday, on his podcast #1536, Joe Rogan had the former NSA contractor and whistleblower, Edward Snowden as a guest. In about a two-and-a-half hour-long podcast the two touched on different topics like end-to-end encrypted data. If you haven’t already, I really recommend listening to this as it’s a very interesting conversation. Snowden was also on the […]
CTemplar Mobile Code is Now Open Source!
Today, we are happy to announce that we have released our CTemplar mobile code as open source! With this, we continue our mission for open source email software and encryption that we are dedicated from day one here at CTemplar. What this means is that all of the CTemplar source code, including the one running […]
What Journalists Need to Know About Digital Safety and Security?
The Internet and the digital era have disrupted many industries. Some, like real estate, marketing, commerce, etc. have found a way to thrive in the new digital world, while others like brick-and-mortar booksellers, language translators, travel agencies have seen a decline as a result of online services like Amazon or Expedia that essentially do the […]
Can the US Government Spy on its Citizens?
In most US citizens’ minds, there is little to no doubt that the government is spying on them. In two separate polls, 7 in 10 (Pew Research Center, 2017) and 8 in 10 (Monmouth University, 2018) people in the United States believe that the US government is tracking their emails, phone calls and other communication […]
7 Quick Tips for Internet Safety and Privacy
The Internet itself is an awesome tool that can enrich your life, but only if you use it smartly. Every year brings a new cautionary tale of Internet privacy violation and this is why we have compiled these 7 quick tips that will protect your Internet safety and privacy if you stick to them. Not […]
What is a Snowshoe Spam Attack and How to Prevent it?
Although they are annoying as hell, one thing has to be said about spammers. They are inventive in finding new ways to avoid spam filters. One such “inventive” way to avoid spam blacklists is the snowshoe spam attack. What is the Snowshoe Spam Email? The first instances of snowshoe spam email date back to 2009, […]
What is Self-Destructing Email and How It Can Help You?
Do you remember playing with invisible ink when you were a kid? Maybe you wrote a secret note that you wanted only one special person to read or you helped a buddy with an answer on a difficult exam. Well, we grew up now so we no longer use invisible ink to write notes. Now […]
Net Neutrality and Privacy: The Pros and Cons of Net Neutrality
As the 2020 US Presidential Elections draw close, we thought it to be a good idea to refresh a little on net neutrality (especially since the two main candidates don’t seem to be paying any attention to it in their campaigns). The net neutrality or Open Internet debate has been going on for over a […]
How to Encrypt Your Internet Connection and Make it Safer?
f you ask Internet users “do you want a more secure Internet connection?” you’ll have a hard time finding one that will answer negatively. Everyone wants a safer Internet. The problem is that most people don’t really know how to get it. At best, they create some strong passwords, avoid potentially malicious websites, look out for […]