Blog

United Airlines and David Beckham — When Emails Leak

April 20, 2017 / in Blog / by Zafar Khan, RPost CEO

What do United Airlines and footballer David Beckham have in common? Disastrous leaked emails. In these recent cases, the leaked emails appear to be legitimate, though Beckham claims some of the leaked emails were “doctored.” But how do we know that leaked email messages discussed in news stories and tabloid columns are actually authentic?

Data Privacy Compliance Audits Target Small Businesses

April 13, 2017 / in Blog / by Zafar Khan, RPost CEO

As consumer awareness of data privacy issues increases, companies that don’t take their clients’ data privacy seriously are getting hit harder and harder. In healthcare, a Florida healthcare provider paid a $5.5 million fine (a HIPAA record) earlier this year for allowing more than 115,000 patient records to be improperly accessed and disclosed. Last year, […]

AT&T and Comcast hit the Motherlode with Internet Privacy Repeal

April 06, 2017 / in Blog / by Zafar Khan, RPost CEO

This week, the President approved a measure that removes internet privacy restrictions for Internet Service Providers (ISPs) who connect millions of consumers and businesses to the Internet through wireline and wireless connections. Privacy advocates and late-night talk show hosts have voiced their outrage over this “internet privacy repeal”. But what is actually at stake?

The Honeypot for Hackers: Twitter Heats Up

March 31, 2017 / in Blog / by Zafar Khan, RPost CEO

The average Internet user has over 100 online accounts, according to Dashlane. Who on earth can keep track of that many accounts? No one really. That’s why millions of people use password managers to keep their passwords encrypted and organized. Typically, password managers are apps that encrypt and store your passwords in the cloud or […]

Why Hasn’t Anyone Thrown Out Their Microwave?

March 17, 2017 / in Blog / by Zafar Khan, RPost CEO

Were you shocked to learn that Wikileaks had published “Vault 7”, leaked documents that reveal the intricate details of CIA’s hacking capabilities? Were you extremely concerned that the CIA has now “lost control” of these tools to the public domain, meaning that any cybercriminal in the world can now learn these methods and use them against […]