<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Tihomir Ivanov

Senior Inbound Marketing Expert

Android malware on steroids: DressCode

[fa icon="calendar'] Oct 21, 2016 4:31:14 PM / by Tihomir Ivanov

A quickly rising threat is hiding within literally thousands of Android apps available on various app stores, CSO Online has recently reported. It's dubbed DressCode and is particularly dangerous because it can infiltrate whatever internet network the infected device connects to.

Read More ...

[fa icon="comment"] 0 Comments

Is encryption a crime? Scotland Yard says yes, and it's so wrong

[fa icon="calendar'] Oct 18, 2016 12:46:26 PM / by Tihomir Ivanov

A single day doesn't pass without authorities or politicians trying to bridle encryption. They push for backdoors in software and devices, closely monitor encryption software and service providers, and keep an even closer eye on way too many people. So many people come to ask: "Is encryption a crime?".

Read More ...

[fa icon="comment"] 0 Comments

New backdoor in Android discovered! Secure Phone is not affected

[fa icon="calendar'] Oct 14, 2016 4:12:21 PM / by Tihomir Ivanov

No matter how much you try to secure a normal smartphone, it will still remain a normal smartphone. This was proved yet again by security researcher Jon Sawyer, who's discovered a backdoor in Android firmware provided by manufacturer Foxconn. The vulnerability allows attackers to root devices to which they have physical access. In other words, to take full control over the device.

Read More ...

[fa icon="comment"] 0 Comments

Because of you, your phone is your weakness

[fa icon="calendar'] Oct 10, 2016 5:08:07 PM / by Tihomir Ivanov

If your communication is sensitive or you have access to confidential data from your phone, you may think that your phone is your weakness. And you'll be right because mobile devices are the weakest link in security according to the latest Tech Pro Research survey of chief information officers, technology executives, and IT employees. But what if I told you it's mostly because of you?

Read More ...

[fa icon="comment"] 0 Comments

You can escape Yahoo but can you escape mass email surveillance?

[fa icon="calendar'] Oct 7, 2016 6:56:47 PM / by Tihomir Ivanov

Yahoo Mail just received another blow to its already crippled reputation. Citing "people familiar with the matter", Reuters reported that last year Yahoo Inc secretly collaborated with US intelligence officials to develop custom software that scrapes all of its users' incoming emails for specific information. In real time!

Read More ...

[fa icon="comment"] 0 Comments

10 privacy organizations oppose UK's mass surveillance in court

[fa icon="calendar'] Oct 3, 2016 7:06:25 PM / by Tihomir Ivanov

When Snowden revealed in 2013 that the UK Government intercepted nearly every bit of information and communication across its territory and had broad access to US mass surveillance data, it was a shock. What's more shocking, though, is that these practices continue to violate the basic rights of hundreds of millions of people. However, 10 privacy organizations are here to stop it, and they mean it. 

Read More ...

[fa icon="comment"] 0 Comments

What will generic phones mean for BlackBerry security

[fa icon="calendar'] Sep 30, 2016 7:50:39 PM / by Tihomir Ivanov

So BlackBerry finally broke the "news". It won't make its own phones anymore. Rather, it'll let partners manufacture them, then just stamp its logo on top. Kind of exactly what it did with the DTEK50!? Right. So now that we have this official confirmation, we can't help but ask the big question. What will this mean for BlackBerry security?

Read More ...

[fa icon="comment"] 0 Comments

How to hack an iPhone for $100, or how the FBI could've saved $1 mln

[fa icon="calendar'] Sep 23, 2016 12:30:00 PM / by Tihomir Ivanov

We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!

Read More ...

[fa icon="comment"] 0 Comments

Secure Pack vs Secure Phone: the key differences

[fa icon="calendar'] Sep 20, 2016 3:28:05 PM / by Tihomir Ivanov

With encryption already starting to go mainstream, chances are you're finally considering adopting it to protect your data and communication. But where do you start from? An app? Several apps? An entire secure phone? We're here to help you out with our neat Secure Pack vs Secure Phone comparison.

Read More ...

[fa icon="comment"] 0 Comments

ZRTP encryption for voice explained

[fa icon="calendar'] Sep 13, 2016 4:52:49 PM / by Tihomir Ivanov

It's generally known email and IM communication can be encrypted when privacy and security are highly necessary. But what about voice? That time when you need to call someone and discuss a sensitive matter. How can you make sure your phone isn't tapped? 10-15 years ago, you would've probably been left with your guard down. Today, not anymore, thanks to ZRTP encryption for voice.

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line