<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Tihomir Ivanov

Senior Inbound Marketing Expert

Android malware on steroids: DressCode
Cybersecurity

Android malware on steroids: DressCode

Is encryption a crime? Scotland Yard says yes, and it's so wrong
Cybersecurity

Is encryption a crime? Scotland Yard says yes, and it's so wrong

New backdoor in Android discovered! Secure Phone is not affected
Cybersecurity

New backdoor in Android discovered! Secure Phone is not affected

Because of you, your phone is your weakness
Cybersecurity

Because of you, your phone is your weakness

You can escape Yahoo but can you escape mass email surveillance?
Cybersecurity

You can escape Yahoo but can you escape mass email surveillance?

10 privacy organizations oppose UK's mass surveillance in court
Cybersecurity

10 privacy organizations oppose UK's mass surveillance in court

What will generic phones mean for BlackBerry security
Cybersecurity

What will generic phones mean for BlackBerry security

How to hack an iPhone for $100, or how the FBI could've saved $1 mln
Cybersecurity

How to hack an iPhone for $100, or how the FBI could've saved $1 mln

Secure Pack vs Secure Phone: the key differences
Cybersecurity

Secure Pack vs Secure Phone: the key differences

ZRTP encryption for voice explained
Cybersecurity

ZRTP encryption for voice explained

OTR encryption for chat explained
Cybersecurity

OTR encryption for chat explained

PGP encryption for email explained
Cybersecurity

PGP encryption for email explained

End-to-end encryption vs link encryption
Cybersecurity

End-to-end encryption vs link encryption

What is encryption? Here's the real answer.
Cybersecurity

What is encryption? Here's the real answer.

Google user data requests hit a new record. Can encryption help privacy?
Cybersecurity

Google user data requests hit a new record. Can encryption help privacy?

Mobile device management & the risks of BYOD
Cybersecurity

Mobile device management & the risks of BYOD

How prepared are you for phone theft or loss? Find out now!
Cybersecurity

How prepared are you for phone theft or loss? Find out now!

Why master keys suck? The TSA locks hack is a great example
Cybersecurity

Why master keys suck? The TSA locks hack is a great example

The terrifying future (present) of biometrics
Cybersecurity

The terrifying future (present) of biometrics

BIGGEST privacy concerns: DRONES (part 3)
Cybersecurity

BIGGEST privacy concerns: DRONES (part 3)

BIGGEST privacy concerns: ENVIRONMENTAL SURVEILLANCE (part 2)
Cybersecurity

BIGGEST privacy concerns: ENVIRONMENTAL SURVEILLANCE (part 2)

BIGGEST privacy concerns: MOBILE DEVICES (part 1)
Cybersecurity

BIGGEST privacy concerns: MOBILE DEVICES (part 1)

How Android encryption can be broken and how Secure Phone beats the hack
Cybersecurity

How Android encryption can be broken and how Secure Phone beats the hack

Social engineering, or turning human nature against us
Cybersecurity

Social engineering, or turning human nature against us

Top 10 reasons why BYOD may not be right for you
Cybersecurity

Top 10 reasons why BYOD may not be right for you

Top 3 misconceptions on Android security
Cybersecurity

Top 3 misconceptions on Android security

Was data about you stolen in 2015? Over half a billion records were...
Cybersecurity

Was data about you stolen in 2015? Over half a billion records were...