<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Secure Chat v2.0: one place to text and call

[fa icon="calendar'] Sep 27, 2017 3:34:22 PM / by Desislava Tsekova

We’re pleased to announce a major upgrade to Secure Chat. Version 2.0 is the biggest upgrade to date, adding voice and video calling, and introducing Group Chat feature.

Read on!

Read More ...

[fa icon="comment"] 1 Comment

How to make sense of encryption protocols

[fa icon="calendar'] Sep 25, 2017 6:35:30 PM / by Stefan Topuzov

If you are looking for ways to secure your privacy online, you should know by now that the first step is to use encryption for everything. Yet, cryptography is not exactly the most popular or easily digestible of sciences. It could be hard to make sense of all the protocol and algorithm names flying around.

Read More ...

[fa icon="comment"] 0 Comments

BlueBorne hack proves how easy it is to exploit Bluetooth

[fa icon="calendar'] Sep 18, 2017 5:55:26 PM / by Stefan Topuzov

We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.

Read More ...

[fa icon="comment"] 0 Comments

Secure Voice v2.10.8: Preparing for the next phase

[fa icon="calendar'] Sep 12, 2017 12:27:57 PM / by Desislava Tsekova

 Although the version numbering doesn’t suggest a big change, it discloses the future of the app and foreshadows a new stage for our encrypted mobile communication solutions.

Read More ...

[fa icon="comment"] 0 Comments

6 ways your phone can get hacked

[fa icon="calendar'] Sep 11, 2017 6:57:41 PM / by Stefan Topuzov

Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 5:50:02 PM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

Phone hacking through SS7 is frighteningly easy and effective

[fa icon="calendar'] Aug 28, 2017 5:38:58 PM / by Stefan Topuzov

Imagine a world in which a low-budget hackers can track your every move, listen to your calls, read your texts, drain your bank account, and so on. All of this without leaving their rooms, and from a continent away. Imagine no more. Due to vulnerabilities in the SS7 protocol, this is the world in which you live right now.

Read More ...

[fa icon="comment"] 0 Comments

What does the Lipizzan spyware mean for mobile communication security?

[fa icon="calendar'] Aug 21, 2017 4:45:47 PM / by Stefan Topuzov

At the end of last month, Google announced it had blocked a new family of malware that had spread through its Play Store. Dubbed Lipizzan, the malicious code wasn’t spectacular in terms of spying capabilities. The part that has bigger implications for mobile security is how it got through Google’s filters in the first place.

Read More ...

[fa icon="comment"] 0 Comments

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone

[fa icon="calendar'] Aug 14, 2017 6:28:45 PM / by Stefan Topuzov

Do you use free hotel Wi-Fi? Well, you better not. Last week security research firm FireEye published a report claiming a notorious hacking group is using a leaked NSA tool to infiltrate hotel networks and steal the credentials of high-profile targets. Just another reason to stay clear of free Wi-Fi hotspots.

Read More ...

[fa icon="comment"] 0 Comments

Why industries need to secure their communications

[fa icon="calendar'] Aug 7, 2017 6:14:54 PM / by Stefan Topuzov

Mobility has become ubiquitous in communication. A given. People cannot picture themselves being physically restrained by a location to make a call, send an email, or engage in a chat session. Everyone has their smartphone with them at all times to connect to the world. Moreover, it also keeps people connected to work. The rise of mobile devices and cloud services has created a business communications landscape vastly different from the one at the turn of the century.

 

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line