<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Want to erase everything on your phone? A factory reset won’t do it

[fa icon="calendar'] Apr 10, 2017 10:23:00 AM / by Stefan Topuzov

The factory reset function of Android smartphones is supposed to delete all apps, files, and settings from the device and restore it to an out-of-the-box state. The process, however, is flawed and leaves a door to recover data. This is why we created the Secure Wipe app for our encrypted communication devices, Secure Phone.

Read More ...

[fa icon="comment"] 0 Comments

Passwords: How to come up with strong ones? (And why yours suck)

[fa icon="calendar'] Jan 9, 2017 10:25:05 AM / by Stefan Topuzov

As imperfect as they are, passwords are still the most common method for authentication. And will continue to be at least in the near future. This makes it critical that everyone uses strong passwords. Unfortunately, what the average Internet user considers a decent password is usually a pretty weak one. Here are a few things to consider when coming up with passwords.

Read More ...

[fa icon="comment"] 0 Comments

Cold War 2.0 is going to be all about cyberwarfare. Buckle up for it in 2017

[fa icon="calendar'] Jan 6, 2017 10:33:10 AM / by Stefan Topuzov

Many are already referring to the renewed tension between the West and Russia as Cold War 2.0. However, the world seems unlikely to return to the days of the nuclear scare, and warheads will hopefully be left to rust in peace. Instead, the new theater of confrontation will be cyberspace, with experts predicting cyberwarfare to escalate in 2017 to an intensity we have never seen before.

Read More ...

[fa icon="comment"] 0 Comments

What to look for when choosing an encrypted communications provider?

[fa icon="calendar'] Dec 30, 2016 7:07:45 AM / by Stefan Topuzov

Are you worried about your online privacy? If you haven’t taken any measures to protect it, yes, you should be. Lucky for you, there is a rapidly growing industry of online security solution providers that would be happy to help you with that problem. These companies offer encrypted communication tools and claim they give you maximum security. Here’s how you should be able to tell apart the encrypted communication providers that you can actually trust.

Read More ...

[fa icon="comment"] 0 Comments

How much is your stolen information worth?

[fa icon="calendar'] Dec 23, 2016 10:01:51 AM / by Stefan Topuzov

Ever wondered why would anyone bother to steal something like one billion Yahoo user account names, passwords and email addresses? At first glance, such information doesn’t seem like the most valuable asset. But to those who know how to make use of it, this data is a great tool to commit identity theft, fraud, or simply drain an unsuspecting victim’s banking account. Because of that cybercriminals are willing to pay for your stolen information. Here’s how much.

Read More ...

[fa icon="comment"] 0 Comments

Why Samsung Knox security isn’t good enough? (Part 2)

[fa icon="calendar'] Dec 5, 2016 10:12:57 AM / by Stefan Topuzov

A few weeks ago we wrote about Samsung Knox, the Korean phone maker’s enterprise mobile security solution, and how it has a history of vulnerabilities and being hacked. We noted that the main problem, even in newer versions where those bugs are fixed, is that Knox sacrifices security in favor of user convenience – and thus, anyone looking for real security should look elsewhere. To further illustrate that point, we decided to put it against our own Secure Phone.

Read More ...

[fa icon="comment"] 0 Comments

How to avoid privacy threats when using free Wi-Fi

[fa icon="calendar'] Nov 21, 2016 10:47:39 AM / by Stefan Topuzov

In an age when people do more and more things on their smartphones, getting to a free Wi-Fi hotspot feels like finding an oasis in the middle of the desert. Who wouldn’t prefer to hop on a free network and browse the hell of the Internet without having to worry about a data limit? Well, just like anything else that’s free, wi-fi comes with a fine print. And its reads “data leaks.”

Read More ...

[fa icon="comment"] 2 Comments

Wi-Fi IMSI-catchers: Another reason to avoid free hotspots

[fa icon="calendar'] Nov 7, 2016 10:15:21 AM / by Stefan Topuzov

Nowadays, IMSI-catchers are pretty much vanilla surveillance. Such devices have been used by law enforcement and not-so-lawful adversaries alike to seize phone data for over a decade. Now, researchers have demonstrated how the same can be done over Wi-Fi. And it is also relatively easy.

Read More ...

[fa icon="comment"] 0 Comments

How to hack an iPhone for $100, or how the FBI could've saved $1 mln

[fa icon="calendar'] Sep 23, 2016 4:30:00 AM / by Tihomir Ivanov

We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!

Read More ...

[fa icon="comment"] 0 Comments

BIGGEST privacy concerns: MOBILE DEVICES (part 1)

[fa icon="calendar'] Jul 11, 2016 1:30:00 AM / by Tihomir Ivanov

Do you know what the average Joe, a geek, a businessman, a criminal and the US president have in common? Well, in 2016, they all want nice smartphones. However, they aren't equally paranoid so they eventually end up with different devices. But what if I told you they should be?...

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line