<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Stefan Topuzov

Security Expert

Secure Group expands global data coverage, improves connectivity
Company news

Secure Group expands global data coverage, improves connectivity

Chip-off: What it is and how we protect against it
Cybersecurity

Chip-off: What it is and how we protect against it

How Secure Group ensures partner success
Company news

How Secure Group ensures partner success

Introducing Secure Vault: One place to store securely all your files
Company news

Introducing Secure Vault: One place to store securely all your files

Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?
Cybersecurity

Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?

Wi-Fi KRACK attack explained. Is Secure Phone affected?
Cybersecurity

Wi-Fi KRACK attack explained. Is Secure Phone affected?

Secure Group expands in Africa
Company news

Secure Group expands in Africa

OMEMO end-to-end encryption for chat explained
Cybersecurity

OMEMO end-to-end encryption for chat explained

How to make sense of encryption protocols
Cybersecurity

How to make sense of encryption protocols

BlueBorne hack proves how easy it is to exploit Bluetooth
Cybersecurity

BlueBorne hack proves how easy it is to exploit Bluetooth

6 ways your phone can get hacked
Cybersecurity

6 ways your phone can get hacked

Fixing SS7 vulnerabilities: What is being done and what you can do
Cybersecurity

Fixing SS7 vulnerabilities: What is being done and what you can do

Phone hacking through SS7 is frighteningly easy and effective
Cybersecurity

Phone hacking through SS7 is frighteningly easy and effective

What does the Lipizzan spyware mean for mobile communication security?
Cybersecurity

What does the Lipizzan spyware mean for mobile communication security?

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone
Cybersecurity

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone

Why industries need to secure their communications
Cybersecurity

Why industries need to secure their communications

Why encryption and mobile security are fundamental for human rights
Cybersecurity

Why encryption and mobile security are fundamental for human rights

Protecting information, data, and individuals: Encryption for the security and defense sector
Company news

Protecting information, data, and individuals: Encryption for the security and defense sector

How instant connectivity and encryption help the energy sector secure its communications
Cybersecurity

How instant connectivity and encryption help the energy sector secure its communications

How encrypted communication solutions help the consulting and accounting sector
Cybersecurity

How encrypted communication solutions help the consulting and accounting sector

Secure communications to help prevent banking and financial fraud
Cybersecurity

Secure communications to help prevent banking and financial fraud

Secure Email V1.31.5 & 1.31.6: Reduced bandwidth consumption and bug fixes
Company news

Secure Email V1.31.5 & 1.31.6: Reduced bandwidth consumption and bug fixes

Securing the pharmaceutical industry’s R&D data: How we do it
Cybersecurity

Securing the pharmaceutical industry’s R&D data: How we do it

How vulnerabilities in SS7 protocol expose all mobile networks to attacks
Cybersecurity

How vulnerabilities in SS7 protocol expose all mobile networks to attacks

Your PIN is very easy to steal. Here is how we keep it safe
Cybersecurity

Your PIN is very easy to steal. Here is how we keep it safe

Why online privacy matters – and how to take it back
Cybersecurity

Why online privacy matters – and how to take it back

6 encryption workarounds (that don’t work on our products)
Cybersecurity

6 encryption workarounds (that don’t work on our products)

IMSI-catchers: What they are, why you should be concerned and how to protect yourself?
Cybersecurity

IMSI-catchers: What they are, why you should be concerned and how to protect yourself?

Want to erase everything on your phone? A factory reset won’t do it
Cybersecurity

Want to erase everything on your phone? A factory reset won’t do it

How being 100% P2P helps Secure Chat guarantee its users' privacy
Cybersecurity

How being 100% P2P helps Secure Chat guarantee its users' privacy

Device encryption and remote wipe: How Secure Phone keeps your data safe
Cybersecurity

Device encryption and remote wipe: How Secure Phone keeps your data safe

Secure Group doesn’t store user encryption keys. Here’s why
Cybersecurity

Secure Group doesn’t store user encryption keys. Here’s why

Why the CIA leaks confirm what we have been saying all along
Cybersecurity

Why the CIA leaks confirm what we have been saying all along

SHA-1 algorithm officially dead, Secure Chat not compromised
Cybersecurity

SHA-1 algorithm officially dead, Secure Chat not compromised

Reducing the attack surface: Why less is more in smartphone security
Cybersecurity

Reducing the attack surface: Why less is more in smartphone security

How data leaks from your smartphone – and can you stop it?
Cybersecurity

How data leaks from your smartphone – and can you stop it?

Google Services and privacy don't mix: How we removed them from Secure Phone
Cybersecurity

Google Services and privacy don't mix: How we removed them from Secure Phone

How not to get hacked: 15 tips to improve your online security
Cybersecurity

How not to get hacked: 15 tips to improve your online security

Lock pattern, PIN, or password: What is the most reliable way to lock a phone?
Cybersecurity

Lock pattern, PIN, or password: What is the most reliable way to lock a phone?

A backdoor or not, there is a vulnerability in WhatsApp. Here’s why
Cybersecurity

A backdoor or not, there is a vulnerability in WhatsApp. Here’s why

The Socialist Millionaire Protocol: How Secure Chat prevents MitM attacks
Cybersecurity

The Socialist Millionaire Protocol: How Secure Chat prevents MitM attacks

Passwords: How to come up with strong ones? (And why yours suck)
Cybersecurity

Passwords: How to come up with strong ones? (And why yours suck)

Cold War 2.0 is going to be all about cyberwarfare. Buckle up for it in 2017
Cybersecurity

Cold War 2.0 is going to be all about cyberwarfare. Buckle up for it in 2017

What to look for when choosing an encrypted communications provider?
Cybersecurity

What to look for when choosing an encrypted communications provider?

To PGP, or not to PGP? That is the question
Cybersecurity

To PGP, or not to PGP? That is the question

How much is your stolen information worth?
Cybersecurity

How much is your stolen information worth?

New official release: Secure Chat 1.10.0
Company news

New official release: Secure Chat 1.10.0

8 things that threaten mobile security
Cybersecurity

8 things that threaten mobile security

Why having encryption backdoors is a very bad idea?
Cybersecurity

Why having encryption backdoors is a very bad idea?

Malicious apps spy on you and steal your data. How can you stop them?
Cybersecurity

Malicious apps spy on you and steal your data. How can you stop them?

New releases: Secure Email 1.28.1, Secure Voice 2.10.1, Secure Manager (LAS) 1.1.04, Secure Administration System (SAS) 1.2.x
Company news

New releases: Secure Email 1.28.1, Secure Voice 2.10.1, Secure Manager (LAS) 1.1.04, Secure Administration System (SAS) 1.2.x

Why Samsung Knox security isn’t good enough? (Part 2)
Cybersecurity

Why Samsung Knox security isn’t good enough? (Part 2)

9 reasons why everyone needs encryption
Cybersecurity

9 reasons why everyone needs encryption

Does quantum computing mean the end of encryption? Not yet
Cybersecurity

Does quantum computing mean the end of encryption? Not yet

Is there a tide of mass surveillance rising? Here’s how to prepare
Cybersecurity

Is there a tide of mass surveillance rising? Here’s how to prepare

Goodbye, License Administration System. Hello, Secure Manager!
Company news

Goodbye, License Administration System. Hello, Secure Manager!

How to avoid privacy threats when using free Wi-Fi
Cybersecurity

How to avoid privacy threats when using free Wi-Fi

Do you rely on Samsung Knox for security? Here’s why you shouldn’t
Cybersecurity

Do you rely on Samsung Knox for security? Here’s why you shouldn’t

How to reclaim your online privacy in 5 practical steps
Cybersecurity

How to reclaim your online privacy in 5 practical steps

Why a Trump presidency could mean bad news for online privacy
Cybersecurity

Why a Trump presidency could mean bad news for online privacy

Wi-Fi IMSI-catchers: Another reason to avoid free hotspots
Cybersecurity

Wi-Fi IMSI-catchers: Another reason to avoid free hotspots

Eavesdropping on what you type: How keystroke sounds may give away your password
Cybersecurity

Eavesdropping on what you type: How keystroke sounds may give away your password

Did the NSA really break Diffie-Hellman? Not quite
Cybersecurity

Did the NSA really break Diffie-Hellman? Not quite

Your everyday messaging app, human rights, and online privacy? Not a match made in heaven
Cybersecurity

Your everyday messaging app, human rights, and online privacy? Not a match made in heaven