Today, you can do everything with your smartphone: surf the Net, manage your money, make medical appointments, book vacations, chat with anyone, sign documents, find your way around, share your thoughts on any subject, etc. In short, you can entrust the most intimate aspect...
Cryptography is THE pillar of computer security. It relies on algorithms that mathematically transform your data to ensure authenticity (certainty as to the identity of the data sender), integrity (certainty that the original data is intact) and confidentiality (cert...
Convinced by the adage “To live happily, let's live hidden”? Let's see how to put it into practice.
When we talk about the security/confidentiality of our “mobiles”, we're really talking about the operating system that runs them. 75% run on An...
It's The security topic par excellence, because you have as many logins as you have accounts on Web sites: bank accounts, social security, taxes, commercial sites, etc... you can reach over 100 accounts without forcing yourself! To authenticate yourself to these...
We've seen that a password must :
In other words, if you're able to remember just one of these passwords, it's because it doesn't meet al...
Email is often used to reset passwords to your Internet accounts, or to communicate with government agencies or companies. Unlike secure instant messaging, e-mail is universal: you can send an electronic message to anyone who has an e-mail address, regardless of their provide...
The possibility of exchanging instant messages between individuals only emerged with the boom in mobile telephony. Previously, instant messaging was only possible over the telephone. SMS, this (relative) novelty, is therefore the 1st instant messag...