June 11, 2017
advantages of dedicated secure phone over app based solutions

Dedicated Secure Phone vs Secure Apps

Privacy-concerned users can secure their communication in two ways – using a dedicated secure phone and using app based solutions on their existing smartphones.

April 27, 2017
Smartphone Malware

Smartphone Malware

Millions of smartphones have been found to be infected by malicious programs called malware. The average smartphone user is hardly aware of smartphone malware.

March 28, 2017
The Cyber Security News

Hackers claim access to millions of iCloud accounts, demand ransom from Apple

A hackers group calling itself 'Turkish Crime Family' has claimed access to over 500 million iCloud accounts, and has threatened Apple to wipe out these accounts if they do not pay a ransom amount.


RECENT NEWS

June 11, 2017
advantages of dedicated secure phone over app based solutions

Dedicated Secure Phone vs Secure Apps

Privacy-concerned users can secure their communication in two ways – using a dedicated secure phone and using app based solutions on their existing smartphones.

April 27, 2017
Smartphone Malware

Smartphone Malware

Millions of smartphones have been found to be infected by malicious programs called malware. The average smartphone user is hardly aware of smartphone malware.

March 28, 2017
The Cyber Security News

Hackers claim access to millions of iCloud accounts, demand ransom from Apple

A hackers group calling itself 'Turkish Crime Family' has claimed access to over 500 million iCloud accounts, and has threatened Apple to wipe out these accounts if they do not pay a ransom amount.

March 2, 2017
Top Cyber Attacks of 2016

Top Cyber Attacks of 2016

Government agencies, corporates firms and leading banks – all have faced cyber-attacks in past. Here is a summary of some of the biggest cyber-security attacks, breaches and data thefts that came into light in 2016.

February 21, 2017
Encryption Algorithms - RSA, AES, Twofish, Blowfish, SHA, MD5, 3DES,

Encryption Algorithms

Some of the most commonly used encryption algorithms are: Triple DEC/DEC, RSA, AES, Blowfish, Twofish, MD5, SHA, HMAC, etc. In this blog post we explain these encryption algorithms in detail.