Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Macate Unveils New Security-Focused “Cyberphone”

GATCA Elite Cyberphone Brings Boosted Security, Privacy

GATCA Elite Cyberphone Brings Boosted Security, Privacy

Macate, a Silicon Valley technology-based secure mobile communication and device maker, today unveiled a new security-focused smartphone that combines advanced security and encryption features to provide users with boosted security and privacy over most traditional smartphones currently in the market.

The new GATCA Elite cyberphone offers multiple layers of biometric and encryption security to secure the device down to the workload level, helping to protect both personal and professional information, the company says.

Based on Google’s popular Android mobile operating system, the cyberphone comes bundled with added security features, such as intelligent human authentication, advanced software encryption to prevent hacking and spoofing, dual SIM cards, and a suite of pre-loaded software and apps.

GATCA Elite cyberphone Unveiled today in Las Vegas at the CES tradeshow, Macate says the device was designed with “high-profile” individuals, corporations and government entities in mind, and is purpose-built to thwart cyber threats.

The sleek Android smartphone will compete directly with the SilentCirlce’s Blackphone, which was first released in early 2014. The company’s latest device, Blackphone 2, began shipping in Sept. 2015.  

Macate’s cyberphone offers 256-bit or 512-bit military-grade encryption, layers of biometric features, location-based protection for the device and its documents, and phone lockdown capabilities when the SIM card is removed or an unfamiliar one is inserted.

Like many smartphones, including Apple’s popular iPhone and many other Android devices, the GATCA Elite cyberphone is manufactured in China, which may raise some concerns for ultra-security minded individuals.

Asked about the potential security concerns over a device claiming the utmost level of security and privacy, a Macate spokesperson told SecurityWeek that it has strong business relationships with its supply chain partners and “a rigorous testing process to ensure no tampering has taken place.”

Advertisement. Scroll to continue reading.

A “GeoLock” feature provides location-based security settings to unlock or lock the devices and/or specific files at designated locations. Additional device lockdown features help protect data in the event the mobile device is lost or stolen, or if a SIM card is removed or replaced.

The smartphone also incorporates “TrueFace” facial recognition software that leverages “liveliness detection” to lock out potential intruders attempting access the device using a 2D image.  

Pre-loaded apps bundled with the device include mail and messenger apps that provide end-to-end encryption. Additionally, a video app allows up to 20 people to join an encrypted video conference.  

While devices like the GATCA Elite cyberphone and the Blackphone do offer increased levels of security and privacy, they are far from bullet proof. Earlier today, security firm SentinelOne revealed details of a vulnerability that exposed Silent Circle’s Blackphone 1 to complete takeover, due to an open and accessible socket associated with NVIDIA’s Icera modems. The vulnerability was patched by Silent Circle on Dec. 7. By default, the Blackphone is designed to periodically check for PrivatOS updates, which are installed over-the-air (OTA). The vulnerability does not affect the newer Blackphone 2 devices.

In addition to device specific vulnerabilities, these ultra-secure smartphones are not immune to a majority of other Android vulnerabilities that surface on an ongoing basis.  

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.