SKY ECC News | Weekly Updates on End to End Encryption Phones| Encrypted iphone & Android message, calls, emails, app & More
Latest News in Privacy
Stay up to date with latest news in privacy and user information protection.
SKY ECC for iOS is here!
Almost nine years ago we started out with the idea to build the best encrypted messaging app on the market. We first launched on BlackBerry devices in 2010 and since then we’ve been adding features and interface improvements to make SKY ECC not only the most secure end-to-end encryption (E2EE) on the market, but the easiest to use as well. Earlier this year we launched SKY ECC 2.0 on Android devices, which let us offer a broader range of devices from Google and BlackBerry. This was a huge step for us, and SKY ECC 2.0 brought in host of new features and improvements, but that wasn’t enough. We wanted more.
Read More
Pen testing conducted by BlackBerry tried and failed to crack the app
At SKY GLOBAL, we created SKY ECC from a belief that secure messaging should be widely available and secure messaging tools should be easy to use. We all have a fundamental right to privacy and should be able to keep our communications private and secure. To get there we need widely available, easy-to-use secure messaging tools. But to have truly secure messaging, we need to have an app built from the ground up with security as its most fundamental feature. We built the app to not even trust the device that it is on, but regardless we went the extra mile by ensuring the devices the app runs on to be just as secure, so you know if the app is secure and the device is secure—your communications are secure.
Read More
The apps to use if you want to keep your messages private
How secure are your private messages? At a time when data breaches are at an all-time high, that’s a question worth thinking about. Hackers, particularly state-sponsored hackers, have shown a willingness to go after big, established tech companies like Yahoo and Google. These big platforms often hold users’ personal information — or in some cases, users’ private correspondence — on their servers.
But there are ways to protect your private communications, and many consumer tech companies are starting to offer better encryption so that your personal messages won’t fall into the wrong hands. Whether you’re concerned about your messages being read by hackers, advertisers or even the police, encryption can protect you.
What products should you be using to enhance your privacy? We took a look at more than a dozen consumer messaging services to give you a better idea.
The key here is whether or not a service is “end-to-end encrypted.” Messages sent with that level of encryption are only readable in two places: The sender’s and recipient’s devices — most likely their smartphones. These messages aren’t stored on company servers, and as a result, can’t be mined to help advertisers or read by law enforcement officials, even with a proper warrant.(That has created controversy for both Apple and WhatsApp in the past.)Which app is right for you? Here are some additional details on some of the more popular apps to help you decide.
Read More
How Android and iOS devices really get hacked
There are many ways to hack mobile devices, but the method people worry about is hard and relatively uncommon. You're more likely to get phished first Amid all the fear and hype generated over the past few days as a result of Wikileaks and its precipitous Vault 7 dump, one fact was crystal clear: People have no idea what hacking an Android smartphone or an iPhone means or what it entails.
News headlines warned of hacking tools that let CIA agents break into anyone’s iPhones, iPads, and Android devices. Wikileaks claimed that there were tools that let agents bypass secure messaging apps like Signal, Telegram, WhatsApp, and Confide to intercept encrypted messages.
While scary, none of those claims are borne out in the initial dump of 7,818 pages and 943 file attachments, many of which read like knowledgebase articles anyone can find.Simply put, Android and iOS devices aren’t any more susceptible to hacking than they ever were, and nothing in the dump suggests that the CIA—if Vault 7 really does describe the CIA’s hacking arsenal—has special tools or exploits that make compromising mobile device easier.
Much of the purported hacking arsenal was composed of bugs not in the mobile OSes but in mobile apps. And the OS bugs that Wikileaks claimed gave it access had previously been fixed by Apple and Google, leaving only older Android devices still vulnerable to them. Many of the hacks require a CIA agent actually get hold of your device to exploit it.
Read More
5 mobile security threats you should take seriously in 2018
Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.
Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. The stakes, suffice it to say, are higher than ever: The average cost of a corporate data breach is $21,155 per day, according to a 2016 report by the Ponemon Institute.
While it's easy to focus on the sensational subject of malware, the truth is that mobile malware infections are incredibly uncommon in the real world — with your odds of being infected significantly less than your odds of being struck by lightning, according to one estimate. That's thanks to both the nature of mobile malware and the inherent protections built into mobile operating systems.The more realistic mobile security hazards lie in some easily overlooked areas, all of which are only expected to become more pressing in the coming year.
Data leakage It may sound like a diagnosis from the robot urologist, but data leakage is widely seen as being one of the most worrisome threats to enterprise security as we head into 2018. What makes the issue especially vexing is that it often isn't nefarious by nature; rather, it's a matter of users inadvertently making ill-advised decisions about which apps are able to see and transfer their information.
Read More