<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Stefan Topuzov

Security Expert

Secure Group expands global data coverage, improves connectivity

[fa icon="calendar'] Mar 15, 2018 12:10:19 PM / by Stefan Topuzov

One of the main advantages of Secure Group’s encrypted mobile communications solutions is that they allow you to talk privately to anyone, from virtually anywhere. To boost the availability of our services even further, we have expanded our data coverage to include 20 more countries.

Read More ...

[fa icon="comment"] 0 Comments

Chip-off: What it is and how we protect against it

[fa icon="calendar'] Feb 8, 2018 11:44:42 AM / by Stefan Topuzov

How safe is the data stored on your smartphone? Depends on the capabilities of the adversaries you face. If you work in a high-stakes industry, the adversaries you face could be sophisticated enough to perform chip-off on your device if they get a hold of it and access all data it stores. How does Secure Group protect you from that?

Read More ...

[fa icon="comment"] 0 Comments

How Secure Group ensures partner success

[fa icon="calendar'] Dec 4, 2017 4:19:46 PM / by Stefan Topuzov

Secure Group’s partner network continues to expand. Today, we are proud to announce the launch of the websites of two companies that recently joined our ranks: Secure Com World and Secret Holder. You can check out their region-specific offerings and submit any inquiries directly to them.

Read More ...

[fa icon="comment"] 0 Comments

Introducing Secure Vault: One place to store securely all your files

[fa icon="calendar'] Nov 6, 2017 5:20:20 PM / by Stefan Topuzov

The next frontier in the fight to regain privacy online is about the security of data at rest. End-to-end encryption does a great job at securing communications, but contemporary attacks find ways around it by targeting unencrypted app databases and storages. This is why we created Secure Vault – an encrypted container app to store all your notes and files.

Read More ...

[fa icon="comment"] 0 Comments

Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?

[fa icon="calendar'] Oct 30, 2017 7:14:17 PM / by Stefan Topuzov

We have written about the almost infinite possibilities for surveillance and malicious activity presented by flaws in the Signaling System 7 (SS7) protocol used by virtually all mobile networks worldwide. A security research firm recently demonstrated how the same exploit can be used to drain a Bitcoin wallet. Which certainly drives home the point about how easy subverting (otherwise reliable) security systems can be.

Read More ...

[fa icon="comment"] 0 Comments

Wi-Fi KRACK attack explained. Is Secure Phone affected?

[fa icon="calendar'] Oct 23, 2017 6:04:10 PM / by Stefan Topuzov

Last week, a report by Mathy Vanhoef of imec-DistriNet revealed a vulnerability in the WPA2 protocol used by virtually all Wi-Fi networks worldwide. The flaw allows hackers to perform a man-in-the-middle (MitM) attack and decrypt and read all Internet traffic going through the network. However, Secure Phone users should rest assured that their security is not compromised.

Read More ...

[fa icon="comment"] 0 Comments

Secure Group expands in Africa

[fa icon="calendar'] Oct 16, 2017 6:14:18 PM / by Stefan Topuzov

Secure Group is excited to announce it is expanding its presence in Africa. We are partnering with South Africa-based Secure Com World as a distributor of our products and services in most of the continent.

Read More ...

[fa icon="comment"] 0 Comments

OMEMO end-to-end encryption for chat explained

[fa icon="calendar'] Oct 9, 2017 6:06:35 PM / by Stefan Topuzov

If you care about your privacy, you need to use apps that provide end-to-end encryption for your communications. Providing this kind of security for group chats is a technical challenge. The OMEMO extension for XMPP, which Secure Chat also uses, solves this challenge with the Double Ratchet Algorithm. Here is how it works.

Read More ...

[fa icon="comment"] 0 Comments

How to make sense of encryption protocols

[fa icon="calendar'] Sep 25, 2017 6:35:30 PM / by Stefan Topuzov

If you are looking for ways to secure your privacy online, you should know by now that the first step is to use encryption for everything. Yet, cryptography is not exactly the most popular or easily digestible of sciences. It could be hard to make sense of all the protocol and algorithm names flying around.

Read More ...

[fa icon="comment"] 0 Comments

BlueBorne hack proves how easy it is to exploit Bluetooth

[fa icon="calendar'] Sep 18, 2017 5:55:26 PM / by Stefan Topuzov

We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line