<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Stefan Topuzov

Security Expert

6 ways your phone can get hacked

[fa icon="calendar'] Sep 11, 2017 6:57:41 PM / by Stefan Topuzov

Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 5:50:02 PM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

Phone hacking through SS7 is frighteningly easy and effective

[fa icon="calendar'] Aug 28, 2017 5:38:58 PM / by Stefan Topuzov

Imagine a world in which a low-budget hackers can track your every move, listen to your calls, read your texts, drain your bank account, and so on. All of this without leaving their rooms, and from a continent away. Imagine no more. Due to vulnerabilities in the SS7 protocol, this is the world in which you live right now.

Read More ...

[fa icon="comment"] 0 Comments

What does the Lipizzan spyware mean for mobile communication security?

[fa icon="calendar'] Aug 21, 2017 4:45:47 PM / by Stefan Topuzov

At the end of last month, Google announced it had blocked a new family of malware that had spread through its Play Store. Dubbed Lipizzan, the malicious code wasn’t spectacular in terms of spying capabilities. The part that has bigger implications for mobile security is how it got through Google’s filters in the first place.

Read More ...

[fa icon="comment"] 0 Comments

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone

[fa icon="calendar'] Aug 14, 2017 6:28:45 PM / by Stefan Topuzov

Do you use free hotel Wi-Fi? Well, you better not. Last week security research firm FireEye published a report claiming a notorious hacking group is using a leaked NSA tool to infiltrate hotel networks and steal the credentials of high-profile targets. Just another reason to stay clear of free Wi-Fi hotspots.

Read More ...

[fa icon="comment"] 0 Comments

Why industries need to secure their communications

[fa icon="calendar'] Aug 7, 2017 6:14:54 PM / by Stefan Topuzov

Mobility has become ubiquitous in communication. A given. People cannot picture themselves being physically restrained by a location to make a call, send an email, or engage in a chat session. Everyone has their smartphone with them at all times to connect to the world. Moreover, it also keeps people connected to work. The rise of mobile devices and cloud services has created a business communications landscape vastly different from the one at the turn of the century.

 

Read More ...

[fa icon="comment"] 0 Comments

Why encryption and mobile security are fundamental for human rights

[fa icon="calendar'] Jul 31, 2017 6:03:25 PM / by Stefan Topuzov

We often repeat that privacy is a fundamental human right. The independence of thought it gives people is necessary for social and political progress. The alternative is tyranny. In today’s world of ubiquitous mobile communications, using encryption is the first step towards preserving that right. Secure Group, however, takes things further with complete solutions for private and secure conversations.

Read More ...

[fa icon="comment"] 0 Comments

Protecting information, data, and individuals: Encryption for the security and defense sector

[fa icon="calendar'] Jul 24, 2017 6:00:31 PM / by Stefan Topuzov

Secure communications are of fundamental importance for the security and defense sector. This is no news. The field is where most advancements in cryptography came from anyway. On top of its encrypted products and services, Secure Group offers innovative approaches to connectivity and infrastructure independence that bring security one step further.

Read More ...

[fa icon="comment"] 0 Comments

How instant connectivity and encryption help the energy sector secure its communications

[fa icon="calendar'] Jul 17, 2017 6:21:49 PM / by Stefan Topuzov

The energy industry is a volatile one. A shift in one company’s operations could cause a domino effect and disrupt entire markets and economies. In a sector like this, information is a high-value asset and the security of communications is a vital part of protecting that information.


Read More ...

[fa icon="comment"] 0 Comments

How encrypted communication solutions help the consulting and accounting sector

[fa icon="calendar'] Jul 10, 2017 6:31:10 PM / by Stefan Topuzov

Companies in the consulting and accounting sector handle sensitive corporate information on a daily basis. This includes the financial books of clients, confidential business plans, personal information, credentials, etc. This data is a goldmine for cybercriminals who can either profit directly from it by using it to commit fraud or by reselling it to competitors. Hence, it is of vital importance for companies to protect it by encrypting their communications, file transfers, and storage.

Read More ...

[fa icon="comment"] 0 Comments