<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

BlueBorne hack proves how easy it is to exploit Bluetooth

[fa icon="calendar'] Sep 18, 2017 9:55:26 AM / by Stefan Topuzov

We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 9:50:02 AM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

How much is your stolen information worth?

[fa icon="calendar'] Dec 23, 2016 10:01:51 AM / by Stefan Topuzov

Ever wondered why would anyone bother to steal something like one billion Yahoo user account names, passwords and email addresses? At first glance, such information doesn’t seem like the most valuable asset. But to those who know how to make use of it, this data is a great tool to commit identity theft, fraud, or simply drain an unsuspecting victim’s banking account. Because of that cybercriminals are willing to pay for your stolen information. Here’s how much.

Read More ...

[fa icon="comment"] 0 Comments

9 reasons why everyone needs encryption

[fa icon="calendar'] Dec 2, 2016 10:44:09 AM / by Stefan Topuzov

Encryption might sound like something just hackers, spies, and criminals use. And yeah, those groups of people probably do use it. But this doesn’t mean they are the only ones that have a good reason to do so. You might be thinking that when you have nothing to hide, there’s no need to worry. You couldn’t be more wrong.

Read More ...

[fa icon="comment"] 0 Comments

Do you rely on Samsung Knox for security? Here’s why you shouldn’t

[fa icon="calendar'] Nov 18, 2016 11:29:48 AM / by Stefan Topuzov

Smartphone security is a growing concern. And the biggest smartphone maker by global market share, Samsung, has rightfully moved in to address the issue by offering is own security solution – Samsung Knox. It, however, is rather an illustration as to why you should look for real security elsewhere.

Read More ...

[fa icon="comment"] 0 Comments

How to hack an iPhone for $100, or how the FBI could've saved $1 mln

[fa icon="calendar'] Sep 23, 2016 4:30:00 AM / by Tihomir Ivanov

We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!

Read More ...

[fa icon="comment"] 0 Comments

Security and Privacy Roundup, September 18th

[fa icon="calendar'] Sep 20, 2015 9:08:34 AM / by Dominic Gingras

Welcome to the September mid-month installment of Secure Group’s Security and Privacy Roundup.  Our newsletter focuses on relevant news articles about security and privacy issues in the world today, in order to inform our customers and anyone interested in these issues.This is the third installment of our bi-monthly compilation, and we hope it proves informative.

There are a few compelling stories this month worth following. In order to keep things as relevant as possible, the stories are posted in descending order, with the latest entries first. Remember, check out our previous entries as well!

Read More ...

[fa icon="comment"] 0 Comments

Security and Privacy Roundup, August 31st

[fa icon="calendar'] Sep 1, 2015 10:20:19 AM / by Dominic Gingras

Earlier this month, we began what we hope to become a regularly updated newsletter rounding up relevant news articles about security and privacy concerns in the world today, in order to inform our customers and anyone interested in these issues.

Read More ...

[fa icon="comment"] 0 Comments

Update on Stagefright, and new vulnerabilities discovered

[fa icon="calendar'] Aug 26, 2015 6:01:04 AM / by Dominic Gingras

Two weeks ago, a frightening vulnerability was discovered on Android phones. Dubbed Stagefright, it allows an attacker potential access to higher functions of your phone by simply sending you a text message with attached and infected media, such as a video or audio clip, or a photo. Luckily, this flaw was discovered relatively early by Zimperium zLabs VP of Platform Research and Exploitation, Joshua J. Drake. A patch was also provided by Drake and co. and Google was quickly alerted to the problem and solution both. End of story? Unfortunately no. Patching issues and new vulnerabilities have complicated things, and your android phone may be vulnerable a while yet. 

Read More ...

[fa icon="comment"] 0 Comments

Encrypted Phone Blackphone HACKED! The HOW and WHY

[fa icon="calendar'] Aug 14, 2014 5:56:00 PM / by Dominic Gingras

Hot new Encrypted Phone Crumbles at Def Con

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line