Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.
Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.
Imagine a world in which a low-budget hackers can track your every move, listen to your calls, read your texts, drain your bank account, and so on. All of this without leaving their rooms, and from a continent away. Imagine no more. Due to vulnerabilities in the SS7 protocol, this is the world in which you live right now.
At the end of last month, Google announced it had blocked a new family of malware that had spread through its Play Store. Dubbed Lipizzan, the malicious code wasn’t spectacular in terms of spying capabilities. The part that has bigger implications for mobile security is how it got through Google’s filters in the first place.
Do you use free hotel Wi-Fi? Well, you better not. Last week security research firm FireEye published a report claiming a notorious hacking group is using a leaked NSA tool to infiltrate hotel networks and steal the credentials of high-profile targets. Just another reason to stay clear of free Wi-Fi hotspots.
Mobility has become ubiquitous in communication. A given. People cannot picture themselves being physically restrained by a location to make a call, send an email, or engage in a chat session. Everyone has their smartphone with them at all times to connect to the world. Moreover, it also keeps people connected to work. The rise of mobile devices and cloud services has created a business communications landscape vastly different from the one at the turn of the century.
We often repeat that privacy is a fundamental human right. The independence of thought it gives people is necessary for social and political progress. The alternative is tyranny. In today’s world of ubiquitous mobile communications, using encryption is the first step towards preserving that right. Secure Group, however, takes things further with complete solutions for private and secure conversations.
Secure communications are of fundamental importance for the security and defense sector. This is no news. The field is where most advancements in cryptography came from anyway. On top of its encrypted products and services, Secure Group offers innovative approaches to connectivity and infrastructure independence that bring security one step further.
The energy industry is a volatile one. A shift in one company’s operations could cause a domino effect and disrupt entire markets and economies. In a sector like this, information is a high-value asset and the security of communications is a vital part of protecting that information.
Companies in the consulting and accounting sector handle sensitive corporate information on a daily basis. This includes the financial books of clients, confidential business plans, personal information, credentials, etc. This data is a goldmine for cybercriminals who can either profit directly from it by using it to commit fraud or by reselling it to competitors. Hence, it is of vital importance for companies to protect it by encrypting their communications, file transfers, and storage.