Silent Circle today unveiled two new devices as part of its Blackphone product line, along with a with new enterprise platform that combines devices, software and services into a privacy and security focused mobile architecture.
Silent Circle has agreed to buy out the joint venture between Silent Circle and Geeksphone, giving Silent Circle a 100 percent ownership stake in SGP Technologies and full ownership of the privacy and security focused “Blackphone”.
Encryption keys for SIM cards obtained by NSA and its British counterpart GCHQ could be used to secretly monitor a large portion of global communications over mobile devices without using a warrant or wiretap.
IBM’s Application Security Research team has conducted a study of 41 popular dating applications for Android and determined that more than 60 percent of them are potentially vulnerable to cyberattacks.
While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe.
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.