<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Stefan Topuzov

Security Expert

How Secure Group ensures partner success

[fa icon="calendar'] Dec 4, 2017 4:19:46 PM / by Stefan Topuzov

Secure Group’s partner network continues to expand. Today, we are proud to announce the launch of the websites of two companies that recently joined our ranks: Secure Com World and Secret Holder. You can check out their region-specific offerings and submit any inquiries directly to them.

Read More ...

[fa icon="comment"] 0 Comments

Introducing Secure Vault: One place to store securely all your files

[fa icon="calendar'] Nov 6, 2017 5:20:20 PM / by Stefan Topuzov

The next frontier in the fight to regain privacy online is about the security of data at rest. End-to-end encryption does a great job at securing communications, but contemporary attacks find ways around it by targeting unencrypted app databases and storages. This is why we created Secure Vault – an encrypted container app to store all your notes and files.

Read More ...

[fa icon="comment"] 0 Comments

Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?

[fa icon="calendar'] Oct 30, 2017 7:14:17 PM / by Stefan Topuzov

We have written about the almost infinite possibilities for surveillance and malicious activity presented by flaws in the Signaling System 7 (SS7) protocol used by virtually all mobile networks worldwide. A security research firm recently demonstrated how the same exploit can be used to drain a Bitcoin wallet. Which certainly drives home the point about how easy subverting (otherwise reliable) security systems can be.

Read More ...

[fa icon="comment"] 0 Comments

Wi-Fi KRACK attack explained. Is Secure Phone affected?

[fa icon="calendar'] Oct 23, 2017 6:04:10 PM / by Stefan Topuzov

Last week, a report by Mathy Vanhoef of imec-DistriNet revealed a vulnerability in the WPA2 protocol used by virtually all Wi-Fi networks worldwide. The flaw allows hackers to perform a man-in-the-middle (MitM) attack and decrypt and read all Internet traffic going through the network. However, Secure Phone users should rest assured that their security is not compromised.

Read More ...

[fa icon="comment"] 0 Comments

Secure Group expands in Africa

[fa icon="calendar'] Oct 16, 2017 6:14:18 PM / by Stefan Topuzov

Secure Group is excited to announce it is expanding its presence in Africa. We are partnering with South Africa-based Secure Com World as a distributor of our products and services in most of the continent.

Read More ...

[fa icon="comment"] 0 Comments

OMEMO end-to-end encryption for chat explained

[fa icon="calendar'] Oct 9, 2017 6:06:35 PM / by Stefan Topuzov

If you care about your privacy, you need to use apps that provide end-to-end encryption for your communications. Providing this kind of security for group chats is a technical challenge. The OMEMO extension for XMPP, which Secure Chat also uses, solves this challenge with the Double Ratchet Algorithm. Here is how it works.

Read More ...

[fa icon="comment"] 0 Comments

How to make sense of encryption protocols

[fa icon="calendar'] Sep 25, 2017 6:35:30 PM / by Stefan Topuzov

If you are looking for ways to secure your privacy online, you should know by now that the first step is to use encryption for everything. Yet, cryptography is not exactly the most popular or easily digestible of sciences. It could be hard to make sense of all the protocol and algorithm names flying around.

Read More ...

[fa icon="comment"] 0 Comments

BlueBorne hack proves how easy it is to exploit Bluetooth

[fa icon="calendar'] Sep 18, 2017 5:55:26 PM / by Stefan Topuzov

We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.

Read More ...

[fa icon="comment"] 0 Comments

6 ways your phone can get hacked

[fa icon="calendar'] Sep 11, 2017 6:57:41 PM / by Stefan Topuzov

Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 5:50:02 PM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line