Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Cellcrypt Launches Encrypted Voice Calling for Android

Cellcrypt, a provider of encrypted voice calling solutions for mobile phones, today announced the availability of Cellcrypt Mobile™ for Android™, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi™, GSM and CDMA wireless networks.

Cellcrypt, a provider of encrypted voice calling solutions for mobile phones, today announced the availability of Cellcrypt Mobile™ for Android™, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi™, GSM and CDMA wireless networks.

Cellcrypt Call Encryption for AndroidCellcrypt Mobile provides encrypted voice calling for off-the-shelf cell phones using government-certified security in an easy-to-use downloadable application that makes highly secure calling as easy as making or placing a normal phone call. It is a software-only solution that uses the IP data channel of cellular (2G, 3G, 4G), Wi-Fi and satellite networks and can be deployed to personnel anywhere in the world in as little as 10 minutes.

Cellcrypt Mobile is in use by governments and corporations globally, uses cryptography certified to U.S. government National Institute of Standards and Technology FIPS 140-2 security standards and has been awarded the CESG Claims Tested Mark (CCTM) from the U.K. government’s information assurance authority.

The interception threat level increased during 2010 as hackers developed, demonstrated and published details of low-cost air-interface interception equipment that uses open source software freely downloadable from the internet and a generic off-the-shelf radio transceiver costing less than $2,000. Another group of hackers demonstrated interception in December 2010 using four modified cell phones as transceivers each costing $15.

At least one top-tier European University has added practical lessons in GSM interception to its curriculum.

“Cellular voice interception is different from other types of data breach,” said Nigel Stanley, Practice Leader, Security at Bloor Research. “If you lose a laptop, USB stick or disk drive it can be fairly obvious that the data has gone missing. But with voice, a successful interception can leave no physical trace so there is little chance of realizing your data has actually been intercepted resulting in disastrous consequences. If you can compromise a cell phone then you are more or less assured that you can collect the most relevant, current and damaging data possible about a user, their business or their private life. By supporting Android devices, Cellcrypt is providing enhanced security for one of the world’s most popular mobile platforms.”

Cellcrypt Mobile for Android is available immediately on devices supporting Android 2.3 and is interoperable with Cellcrypt running on other devices such as Nokia and BlackBerry smartphones.

In October,  AT&T launched AT&T Encrypted Mobile Voice, a carrier-provided two factor encryption service, which provides high-level security features for calls on the AT&T wireless network. For those looking for a secure voice conferencing solution, Cellcrypt provides conference calling service that provides both device authentication and voice call encryption to participants using popular mobile devices including BlackBerry and Nokia. Cellcrypt also provides Cellcrypt Enterprise Gateway, enabling business users secure calls to office landlines from mobile phones. The enterprise solution is targeted to executives traveling to hostile countries where phone interception is prevalent.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed the new CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.