Three Steps to Secure Your Social Media Accounts

Today, a typical internet user has dozens of passwords to keep safe. The first thing hackers do when they've compromised a username and password from one site is try and log into a different site with the same details. The best way to avoid…

How Digital Signatures Work

Digital signatures are used anywhere you might need to prove that you are communicating with the individual, organisation or service that you expect to be. This might be through digitally 'signing' an email or providing 'signed' software to end users to prove that it's…

Getting Started with the Nitrokey HSM 2

The folks at Nitrokey kindly sent me a Nitrokey HSM 2 as part of the Nitrokey Community Program. The tiny, thumb-drive sized device is actually a Hardware Security Module, a device that holds cryptographic keys and performs encryption and decryption. If you've not come…