Internet Security Threats: Who Can Read Your Email?
Before being able to choose a secure Internet communication system, you need to understand the threats to your security.
Since the beginning of the Internet there has been a naive assumption on the part of most email users that the only people who are reading their email are the people they are sending it to. After all, with billions of emails and gigabytes of data moving over the Internet every day, who would be able to find their single email in such a flood of data?
Wake-up and smell the coffee! Our entire economy is now information based, and the majority of that mission critical information is now flowing through the Internet in some form, from emails and email attachments, to corporate FTP transmissions and instant messages.
Human beings, especially those strange creatures with a criminal mind, look for every possible advantage in a dog eat dog world, even if that advantage includes prying into other peoples' mail or even assuming your identity. The privacy of your Internet communications has now become the front line in a struggle for the soul of the Internet.
The New Generation Packet Sniffers:
At the beginning of 2001, most computer security professionals began to become aware of an alarming new threat to Internet security, the proliferation of cheap, easy to use packet sniffer software. Anyone with this new software, a high school education, and network access can easily eavesdrop on email messages and FTP transmissions.
Software packages such as Caspa 3.0 or PassDetect - Ace Password Sniffer automate the task of eavesdropping to the point were if you send an email messages over the Internet with the phrase "Credit Card", it's almost a certainty that someone, somewhere will capture it, attachments and all.
(Caspa 3.0 - from ColaSoft Corporation, located in Chengdu, China http://www.colasoft.com ,PassDetect - a product whose advertised purpose is to sniff passwords sent in email, over HTTP, or over FTP from EffeTech Corporation, http://www.effetech.com )
A good example of this new class of software is called MSN Sniffer, also from Effetech, and it highlights the "party line" openness of today's LAN and Internet environments. Just like old telephone party lines, MSN sniffer lets you listen-in on other people's conversations, just like picking up another phone on a party line.
On their web site, Effetech advertises MSN Sniffer as:
"a handy network utility to capture MSN chat on a network. It records MSN conversations automatically. All intercepted messages can be saved as HTML files for later processing and analyzing. It is very easy to make it to work. Just run the MSN Sniffer on any computer on your network, and start to capture. It will record any conversation from any PC on the network."
Just as the Internet has been flooded by a deluge of spam messages after the introduction of cheap, easy-to-use spam generation software, the same effect is now taking place with sniffer software. The major difference is that, unlike spam, Internet eavesdropping is totally invisible, and ten times as deadly. How much of the identity theft being reported today is a direct result of Internet eavesdropping? Its hard to tell, but with the every growing dependency by individuals and corporations on Internet communications, opportunities to "capture" your sensitive data abound.
Most FTP transmission are unencrypted!
As of November 2003, the majority of corporate FTP transmissions are still unencrypted (unencrypted is geek speak for "in the clear" ) and almost all email communications take place "in the clear". Many email and FTP transmissions travel over 30 or more "hops" to make its way from the sender and receiver. Each one of these hops is a separate network, often owned by a different Internet Service Provider (ISP).
Any Idiot in the Middle
Even a well run corporation must still primarily rely on trusting its employees, contractors and suppliers to respect the privacy of the data flowing over its networks. With the new sniffer technology, all it takes is one "idiot in the middle", and your security is compromised. It could be the admin assistant sitting in the cubical next to you, or a network assistant working for one of the many ISPs your data will travel over, but somewhere, someone is listening. Maybe all he is looking for is his next stock trading idea, or maybe he wants to take over your eBay account so he can sell a nonexistent laptop to some unsuspecting "sucker" using your good name. its all happening right now, at some of the most respected companies in the world.
Access to your network doesn't have to come from a malicious or curious employee-many Internet worms, Trojans and viruses are designed to open up security holes on a PC so that other software can be installed. Once a hacker has access to one computer in your network, or one computer on your ISP's network, he can then use a sniffer to analyze all the traffic on the network.
So I'll password-protect my files, right?
You're getting warmer, but this still isn't going to do the trick. It's a good way to stop packet sniffers from searching for key words in a file, but unfortunately it is not as secure as you might think. If you ever forget a Zip, Word or Excel password, don't worry, just download the password tool from Last Bit Software www.PasswordTools.com, it works very well. There are many other packages out on the Internet but Last Bit's tool is the most robust and easy to use, if a bit slower that some others.
So what can I do about it?
OK, so now that you understand the threat, what can you do about it?
Stop using the Internet? - More than a few professionals are returning to phone calls and faxes for all their important communications.
Complain to your IT department? - If you have an IT department in your company this is a good place to start. But did the spam mail stop when you complained about it to your LAN administrator? Unfortunately he is almost as helpless as you are.
Encrypt your communications with PKI, etc. - For email this is a bit drastic, and can be very expensive, especially since you will need to install a key on each PC and coordinate this with the receivers of your email messages, your IT organization, etc.
Use FileCourier - This is by far the easiest and most cost effective way to protect your email attachments, or replace FTP transmissions. It takes out the "idiot in the middle" with a very clever solution.
The FileCourier approach to Security
I believe that FileCourier is the easiest out-of-the box secure communication system available.
FileCourier approaches Internet data transfer security in a unique way. Until FileCourier was first released in December of 2002, all secure email and file transmission systems relied on encrypting the data during the tried and true method of "upload, store, and forward". When you send an email, it and any documents attached to it are first transmitted to one or more intermediate servers. These mail server store the documents and then attempt to forward it to the receivers email server. To secure the transmission of the email requires either the servers to use extra encryption software technology, or forces the individual sender and receivers to install encryption software and their associated keys, or both. Not only is this a costly and time consuming exercise but it also often fails to protect the data over the complete path of the transmission.
What do you do if the receiver is in another company and doesn't have any encryption software installed? What if his company is using a difference encryption standard? Ignoring the complexity of existing secure email and FTP systems their biggest failings continue to be the "idiot in the middle". From a nosey email or FTP server administrator, to a hungry co-worker, to an incompetent who lets a hacker have free reign of their server, if your sensitive documents are stored on a server maintained by someone else then that person, or his company, can view your documents.
The FileCourier approach is creative, yet simple. FileCourier utilizes existing email and instant messaging systems in the same way you use an envelope to send a letter thru the US postal service, as a wrapper for the real content. We assume that EVERYONE can read what is in the email, so we don't send your documents in the email at all. In fact your documents never leave your PC, until the receiver of the email requests it.
How it works:
FileCourier lets you ticket the file you want to email, and then instead of sending the file in the email, sends a "FileTicket" instead. The file is only transmitted to the receiver of the email when he opens the FileTicket and is "authenticated". After the receiver is authenticated the file is transmitted through an SSL (secure socket layer) tunnel directly from the sender's PC to the receiver's PC through our secure relay servers. SSL is the same security used by banks and is impossible for packet sniffers to penetrate. With FileCourier each packet is encrypted using a 1024 bit key and is delivered to your receiver through his browser. FileCourier lets your communications go un-detected by any sniffer, and removes the "idiot in the middle" threat by never storing the data on an intermediate server. More over, FileCourier is the easiest way to secure your sensitive data transmission in both an Internet and corporate LAN environment.
Take Action Now!
Internet communications security is one of the most important privacy issues we face today. It might feel a bit paranoid for a law-abiding citizen to encrypt his email communications and computer document transmissions, but would you send a customers contract thru normal mail without an envelope? How would you feel if your employer sent your next pay stub to you on the back of a postcard? Use FileCourier, just like you would use a envelope for regular mail. Download the no obligation free trial today at www.filecourier.com and send 50MB of data securely for free!
About The Author
Mark Brooks is a software architect, internet entrepreneur and founder of CanDo Networks Corporation. CanDo Networks Corporation makes easy-to-use software for communicating large amounts of data securely and privately over the Internet. Its flagship product, FileCourier (www.filecourier.com), is used by thousands of legal, medical, and computer professionals to securely deliver files over the internet, to anyone, anywhere
Punchey Reports Exponential Software Growth PRNewswire
Getting a handle on software metrics Techerati
Privacy fears over employers using monitoring software to check home workers are at their desks - Yahoo Sports
Privacy fears over employers using monitoring software to check home workers are at their desks Yahoo Sports
NEC Display Expands Cutting-Edge Software ProAssistTM to More Projectors Rome News-Tribune
Global Automotive Software Market 2020-2024: Breakdowns for Application Software, Middleware, Operating Systems - ResearchAndMarkets.com - Odessa American
Global Automotive Software Market 2020-2024: Breakdowns for Application Software, Middleware, Operating Systems - ResearchAndMarkets.com Odessa American
GT Software Announces Strategic Partnership with Australia-Based Strategic Consulting Partnerships (SCP) - Yahoo Finance
GT Software Announces Strategic Partnership with Australia-Based Strategic Consulting Partnerships (SCP) Yahoo Finance
Photo Editing Software Market Forecast to 2027 - COVID-19 Impact and Global Analysis by Type ; End User ; Platform ; and Geography - GlobeNewswire
Photo Editing Software Market Forecast to 2027 - COVID-19 Impact and Global Analysis by Type ; End User ; Platform ; and Geography GlobeNewswire
Nearly 50 Percent of Organizations Knowingly Push Vulnerable Software, According to New Research from ESG and Veracode - Odessa American
Nearly 50 Percent of Organizations Knowingly Push Vulnerable Software, According to New Research from ESG and Veracode Odessa American
NI Announces SystemLink™ Enterprise Software Yahoo Finance
Data-as-a-service software firm K2View attracts $28 million to target new markets - The Dallas Morning News
Data-as-a-service software firm K2View attracts $28 million to target new markets The Dallas Morning News
Why is it important to actually use antivirus software? Windows Central
Siren sounds are from software tests in E'town Elizabethtown News Enterprise
Insights into the Procurement Software Market: Growth, Trends and Forecasts (2020-2025) - Reported Times
Insights into the Procurement Software Market: Growth, Trends and Forecasts (2020-2025) Reported Times
Student Group Spotlight: Code the Change, Building Software for Social Impact - USC Viterbi School of Engineering
Student Group Spotlight: Code the Change, Building Software for Social Impact USC Viterbi School of Engineering
For His Birthday, Software Solutions CEO Challenges Employees and Customers to Save Energy - GlobeNewswire
For His Birthday, Software Solutions CEO Challenges Employees and Customers to Save Energy GlobeNewswire
Quobyte storage software takes a bite at HPC and machine learning Blocks and Files
Custom software development firm TopDevz delivers a new Saas platform for a leading human resources management company - PRNewswire
Custom software development firm TopDevz delivers a new Saas platform for a leading human resources management company PRNewswire
A Leading ERP Software Provider, Xledger, Chose Creatio to Align its Marketing, Sales and Account Management Processes - PRNewswire
A Leading ERP Software Provider, Xledger, Chose Creatio to Align its Marketing, Sales and Account Management Processes PRNewswire
Global Hospitality Property Management Software (PMS) Market 2020-2025 - On-Cloud Deployment of PMS to Grow Significantly - ResearchAndMarkets.com - Business Wire
Global Hospitality Property Management Software (PMS) Market 2020-2025 - On-Cloud Deployment of PMS to Grow Significantly - ResearchAndMarkets.com Business Wire
McKinney software and delivery company CourMed expands with city grant Community Impact Newspaper
Nokia IMPACT software helps Telefónica's Movistar Chile deploy advanced smartwatch services - GlobeNewswire
Nokia IMPACT software helps Telefónica's Movistar Chile deploy advanced smartwatch services GlobeNewswire
MRI Software report finds some soft spots starting to emerge in the multifamily property market - Crain's Cleveland Business
MRI Software report finds some soft spots starting to emerge in the multifamily property market Crain's Cleveland Business
Anglepoint Named a Leader in New Gartner Magic Quadrant for Software Asset Management Managed Services - PRNewswire
Anglepoint Named a Leader in New Gartner Magic Quadrant for Software Asset Management Managed Services PRNewswire
Predictive Analytics Software Monitors, Identifies, Analyzes, and Offers Solutions to Resolve Power Issues - Industry Analysts Inc
Predictive Analytics Software Monitors, Identifies, Analyzes, and Offers Solutions to Resolve Power Issues Industry Analysts Inc
Hyundai Structural Repair Procedures and Material Guidelines Now Available in Mitchell Software - Collision Week
Hyundai Structural Repair Procedures and Material Guidelines Now Available in Mitchell Software Collision Week
2020 Software Source - Reports McKnight's Long Term Care News
SF to consider LEDA grant for software firm Albuquerque Journal
Mobile Guardian launches $1 million COVID-19 software grant to assist schools to implement distance learning through mobile device technology - PRNewswire
Mobile Guardian launches $1 million COVID-19 software grant to assist schools to implement distance learning through mobile device technology PRNewswire
Northland Power Selects PCI Energy Trading and Risk Management (ETRM) Cloud Software for the Mexico Wholesale Electricity Market (MEM) - Odessa American
Northland Power Selects PCI Energy Trading and Risk Management (ETRM) Cloud Software for the Mexico Wholesale Electricity Market (MEM) Odessa American
satellites artificial intelligence (AI) software Military & Aerospace Electronics
SonimWare Enterprise Mobility Software Enables Seamless Deployment, Management and Support for Sonim Ultra-Rugged Devices - PRNewswire
SonimWare Enterprise Mobility Software Enables Seamless Deployment, Management and Support for Sonim Ultra-Rugged Devices PRNewswire
Increasing Opportunities for Practice Management in the Global Veterinary Software Market to 2025 - GlobeNewswire
Increasing Opportunities for Practice Management in the Global Veterinary Software Market to 2025 GlobeNewswire
How an Edmonton software company helps small service businesses get the job done - The Globe and Mail
MedAcuity advising Ventilator Project on software | Medical Design and Outsourcing - Medical Design & Outsourcing
MedAcuity advising Ventilator Project on software | Medical Design and Outsourcing Medical Design & Outsourcing
Local companies join forces to create software to help organizations track COVID-19 testing - Fox 59
Magnitude Software Appoints Jeffrey Shoreman as CEO GlobeNewswire
Materialise Q2 2020 revenue declines by more than 20 percent despite software growth - 3D Printing Industry
Materialise Q2 2020 revenue declines by more than 20 percent despite software growth 3D Printing Industry
Software Adds Machine Vision-Based Registration Functionality For Advanced Photometric Analysis – Metrology and Quality News - Online Magazine - "metrology news"
Software Adds Machine Vision-Based Registration Functionality For Advanced Photometric Analysis – Metrology and Quality News - Online Magazine "metrology news"
KeyBanc Capital Markets Survey Reveals Growth Expectations Among Private Software Companies Cut In Half - The Morning Journal
KeyBanc Capital Markets Survey Reveals Growth Expectations Among Private Software Companies Cut In Half The Morning Journal
Apple releases its first ever public beta test of the Apple Watch software - test out watchOS 7 now! - Pocket-lint
Apple releases its first ever public beta test of the Apple Watch software - test out watchOS 7 now! Pocket-lint
Q CELLS acquires US-based energy storage software platform provider Energy Storage News
Claroty and Check Point Software Technologies Partner to Secure Industrial Control Networks - PRNewswire
Claroty and Check Point Software Technologies Partner to Secure Industrial Control Networks PRNewswire
Global Enhanced Ambulatory Patient Grouping Software Market Size Share, Size, Growth Opportunities: - PharmiWeb.com
Global Enhanced Ambulatory Patient Grouping Software Market Size Share, Size, Growth Opportunities: PharmiWeb.com
SML Announces Features in its Clarity RFID Software Application as More retailers are Using Clarity to Increase Sales - Supply and Demand Chain Executive
SML Announces Features in its Clarity RFID Software Application as More retailers are Using Clarity to Increase Sales Supply and Demand Chain Executive
Frances Allen, Who Helped Hardware Understand Software, Dies at 88 The New York Times
IPS Partners with Advantage Software to Transform the Payables Lifecycle for Advertising Agencies and Marketing Companies - PR Web
IPS Partners with Advantage Software to Transform the Payables Lifecycle for Advertising Agencies and Marketing Companies PR Web
E-commerce Software and Services Spending Market To Witness Massive Growth By 2025 | IBM, Oracle, TCS - The Daily Chronicle
E-commerce Software and Services Spending Market To Witness Massive Growth By 2025 | IBM, Oracle, TCS The Daily Chronicle
Tesla releases software update with interesting new features, suspension settings, and more - Electrek
Tesla releases software update with interesting new features, suspension settings, and more Electrek
Magnitude Software Puts Power of Oracle Business Application Data in Hands of Business Users with Noetix 7 - Database Trends and Applications
Magnitude Software Puts Power of Oracle Business Application Data in Hands of Business Users with Noetix 7 Database Trends and Applications
Clean energy VC funding roundup: Residential flow batteries, solar sales software and financing, EV charging and more - pv magazine USA
Clean energy VC funding roundup: Residential flow batteries, solar sales software and financing, EV charging and more pv magazine USA
Software that monitors students during tests perpetuates inequality and violates their privacy - MIT Technology Review
Software that monitors students during tests perpetuates inequality and violates their privacy MIT Technology Review
U.S. Government Contractor Embedded Software in Apps to Track Phones The Wall Street Journal
New York’s mass transit agency asks Apple to tweak iPhone software over coronavirus concerns - Fox Business
New York’s mass transit agency asks Apple to tweak iPhone software over coronavirus concerns Fox Business
The essential revenue software stack TechCrunch
Hacking the PLC via Its Engineering Software Dark Reading
NYSE Owner Agrees to Buy Mortgage-Software Firm Ellie Mae The Wall Street Journal
There is no productivity software The Next Web
Dow Jones Jumps 275 Points, Fueled By Nike Breakout; Software Stocks Slammed Again - Investor's Business Daily
Dow Jones Jumps 275 Points, Fueled By Nike Breakout; Software Stocks Slammed Again Investor's Business Daily
What is Shareware?
Shareware is software that you can try before you buy; shareware is a kind of marketing method for software. Software developers post trial versions of their software on websites.
The Opera Alternative
Security flaws have long plagued Internet Explorer (IE), the market-dominating web browser from Microsoft. IE won the early browser wars, not only because it was free and bundled with Windows, but because it had some features and capabilities that its only real competitor, Netscape, didn't have.
Is Your Computer Sick?
Viruses and spyware usually show up on your computer one of two ways.Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar.
The Dirt on Screensavers
Remember back in the days where screensavers were the coolest thing at the office? You could stare at your co-worker's "fish in the ocean" screensaver at the cubicle next door for hours and actually have a full afternoon of conversation about that one screensaver.Well, screensavers are still "in", but not as "in" as they used to be.
Internet Relay Chat - A Basic Introduction
What is IRC?IRC is Internet Relay Chat. It is a group of networked server computers that let clients (or users) connect and passes their message among the networked servers in almost real time.
Configure Windows Indexing Service for Performance
The Windows Indexing Service provides you with the ability to perform advanced searches on directories located on your computer and on shared directories on the network. The Indexing Service was introduced with IIS (Internet Information Services) and is now installed with Windows 2000 and Windows XP.
Microsoft Great Plains: carpet, textile, fabric, felt distributor - implementation overview
In this small article we will show you the possible way of deploying Microsoft Business Solutions Great Plains for the market niche of large, mid-size and small reselling and distribution business in carpeting and floor covering, textile & fabric. We will not be talking about fabric production, but rather cutting for the end-user or small retailer.
Need of Document Management System (DMS)
Document Management or Enterprise Information Management is perhaps one of the most important of the enterprise solutions that will provide a solution to the various requirements of SOX. Several sections of SOX have a direct bearing on the manner in which the digital documents/records of the enterprise are created, reviewed, approved, stored, retrieved, transferred, and destroyed.
OEComplete - A Personal Information Manager
OEComplete is a utility for managing the personal information of the user. It is designed to be flexible and affordable even for the home user.
6 Easy Steps for a Smoother CD/DVD Order
It's all about turn times in the eMedia industry! The speed with which your vendor can get your CD or DVD project completed is vital to many customers. However, responsibility for these projects meeting their completion dates starts with the customer and ends with the vendor.
QuarkXpress Tips: How to Move Content Between Print and Web Layouts
Since its release in 1987, QuarkXpress had made an immediate impact to computer enthusiasts. QuarkXPress introduced precision typography, layout and color control to the desktop computer, and delivered those features to designers at a fraction of the cost of proprietary typesetting systems.
Microsoft Great Plains Oil & Gas - Implementation & Customization Highlights
Microsoft Great Plains serves the wide spectrum of horizontal markets. Great Plains could be considered as ERP platform, which you could expand with third party modules or advance with your own in-house custom functionality.
Microsoft CRM Implementation & Remote Support
We would like to give you pluses and minuses of Microsoft CRM. Web and MS Outlook based client - this means that you don't need additional installations or training - everyone is using Outlook if you are on Windows XP/2000/2003SQL Server database - just to mentionIntegration with Microsoft Exchange 2003/2000 - this means that replies to CRM originated emails will be captured and store in CRM as activities for the Contact, Account or Lead.
Basic Tips and tricks for Windows XP
Running Applications in Compatibility Mode With Windows XP, you can run programs as if though they were being run under a different operating system. (This is known as "emulation".
Great Plains Dexterity: Customizations & Source Code Programming
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on GPS proprietary programming language and development environment - Great Plains Dexterity. When Microsoft bought Great Plains Software, Dynamics was renamed into Microsoft Great Plains, but Dexterity is still the architectural base, there were trends to move MS Great Plains to .
Free Program Removes Spyware not Detected by Premium Security Scan
What is Spyware?Spyware monitors your surfing habits and sends the data off to some remote server in cyberland. Your computer can get infected with spyware easily by visiting a web page or installing a software program.
Cisco Certification: Introduction To ISDN, Part III
Configuring PPP PAP AuthenticationNow we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Crystal Reports For Microsoft Navision - Overview For Programmer/IT Specialist
Let us give you - developer some hints in the report creation. C/SIDE database - use C/ODBC to create the connection for your Crystal Report.
Anti-virus software is used to find, remove or fix files that are infected with computer viruses. Most anti-virus companies release weekly updates of their databases to help keep you safe.
Microsoft CRM - Consulting in the Post-Recession Time
New post-recession era has new features, which didn't exist in late 1990th during high-tech boom. This will be in our opinion on new directions for Microsoft Business Solutions products consulting, including Microsoft CRM.
|home | site map|