13th Mar 2015

0 Comments

CourteOrders: Automate and Secure the Court Order Process

CourteOrders, developed by Image-X Enterprises, allows for easy signing and processing of court documents through integrating electronic signature technology with a secure web interface. Document exchange, storage, and signing technology, integrated with a court’s existing…

Read More

12th Mar 2015

0 Comments

Blue Cross Employee Charged for ID Theft

Wow. Just wow. That’s all I can say with our healthcare and health insurer sector. Recently, a former Blue Cross Blue Shield of Michigan employee was charged for being connected to an insider ID theft…

Read More

11th Mar 2015

0 Comments

Digital Certificate: What, Why, and How?

Let’s start out with an analogy to get your brain thinking. An email message is to a postcard as a digital certificate encrypted email message is to a sealed envelope. Allow me to explain. An…

Read More

11th Mar 2015

0 Comments

Apple Watch Security Issues

The long-awaited Apple Watch is finally being unveiled to nine countries starting April 24, 2015! Prices will range anywhere from $349 to $10,000, depending the watch’s amenities and features. In addition to the normal Apple…

Read More

11th Mar 2015

0 Comments

ClerkePass: Electronically Fulfill Certified Doc Requests

ClerkePass is a PKI based digital signature solution and one of ESignIT’s numerous digital certificate based services. It allows citizens to request certified or non-certified documents from the clerk of the court without having to…

Read More

6th Mar 2015

0 Comments

Identity Fraud is Declining for First Time in 5 Years

According to Javelin Strategy & Research’s report, 2014 presented a slight drop of 3 percent in identity fraud. Identity fraud is the theft, compromise, or exposure of your identity and all details that are entailed,…

Read More

6th Mar 2015

0 Comments

57 Hackers Arrested by UK Police

Over the course of this week, the UK police have launched more than a dozen full-scale cybercrime raids, resulting in the arrest of 57 hackers. These cybercrime raids were in response to a hack attack…

Read More

5th Mar 2015

0 Comments

Symmetric Key Encryption vs. Public Key Infrastructure Encryption

What’s the difference between symmetric key and pubic key encryption? Symmetric key utilizes the same key, whereas public key encryption, otherwise known as public key infrastructure or PKI, utilizes a pair of keys called the public…

Read More

4th Mar 2015

0 Comments

50,000 Uber Drivers Affected by Data Breach

Uber, a smartphone-based ride-sharing service, was victimized by a data breach in May 2014. 50,000 of its U.S. Uber drivers had their personal information compromised. Uber is now filing a lawsuit and demanding the court…

Read More