#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

Silent Circle | Breaking Cybersecurity News | The Hacker News

Silent Circle's Blackphone - Privacy and Security Focused Smartphone for $629

Silent Circle's Blackphone - Privacy and Security Focused Smartphone for $629

Feb 24, 2014
Earlier this year encrypted communications firm Silent Circle and Spanish Smartphone maker Geeksphone  announced a  privacy-focused  encrypted  S martphone  called ' Blackphone ' and today the company has revealed it as ' Mobile World Congress ' in Barcelona. The Blackphone titled as, " world's first Smartphone which places privacy and control directly in the hands of its users, " has a fully customized version  customized version of Android called PrivatOS   and pre-installed with lots of  privacy-enabled applications, is now available for pre-order for about $629 . Silent Circle was co-founded by a respected Cryptographer  Phil Zimmermann,  best known as the creator of  Pretty Good Privacy (PGP) , which is a widely used email encryption software. The Blackphone handsets main focus is keeping all of your data secure, and to stop government agencies snooping on your communications. Blackphone will come with a set of application developed by Silent Circle , incl
PGP Inventor announced encrypted PrivatOS based #BLACKPHONE against NSA surveillance

PGP Inventor announced encrypted PrivatOS based #BLACKPHONE against NSA surveillance

Jan 16, 2014
Mobile security may not be secure as you think. In September we have reported that the National Security Agency has the ability to access data on iOS, Android and even BlackBerry devices. Everyday a new revelation of NSA Surveillance Program makes Security and Privacy a major concern for all of us. Today we feel the need of highly secured Networks and Encrypted Devices to safeguard our privacy from Cyber Criminals as well as Government. Phil Zimmerman , Inventor of the email encryption tool PGP and Silent Circle's Co-founder (company specializes in mobile privacy and peer-to-peer encryption ) has announced ' BLACKPHONE ', a Smartphone that's been designed to enable secure, encrypted communications, private browsing and secure file-sharing. The company will launch BLACKPHONE in the ' Mobile World Congress ', Spain next month, offers ' PrivatOS ', an Android based operating system which will allow users to make and receive secure phone calls, exchange secure te
SaaS Compliance through the NIST Cybersecurity Framework

SaaS Compliance through the NIST Cybersecurity Framework

Feb 20, 2024Cybersecurity Framework / SaaS Security
The US National Institute of Standards and Technology (NIST) cybersecurity framework is one of the world's most important guidelines for securing networks. It can be applied to any number of applications, including SaaS.  One of the challenges facing those tasked with securing SaaS applications is the different settings found in each application. It makes it difficult to develop a configuration policy that will apply to an HR app that manages employees, a marketing app that manages content, and an R&D app that manages software versions, all while aligning with NIST compliance standards.  However, there are several settings that can be applied to nearly every app in the SaaS stack. In this article, we'll explore some universal configurations, explain why they are important, and guide you in setting them in a way that improves your SaaS apps' security posture.  Start with Admins Role-based access control (RBAC) is a key to NIST adherence and should be applied to every SaaS a
'Dark Mail Alliance', Future of surveillance proof email technology

'Dark Mail Alliance', Future of surveillance proof email technology

Oct 31, 2013
Yesterday I learned about  ' Dark Mail Alliance ', where  Lavabit , reportedly an email provider for NSA leaker Edward Snowden and Silent Circle comes together to create a surveillance-proof email technology. Ladar Levison at Lavabit and Silent Circle CEO Mike Janke, Founders of two e-mail services that recently shut down amid government efforts to nab encryption keys, as well as the larger revelations regarding the NSA's surveillance efforts. The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders i.e. inbox, sent mail, and drafts. But where it differs is that it applies peer-to-peer encryption not only to the body of the digital missive, but also to its metadata (To:, From: and Subject fields) that third parties are most likely to collect. The encryption, based on a Silent Circle instant messaging protocol called SCIMP and the secret keys generated to encrypt the communic
cyber security

Are You Vulnerable to Third-Party Breaches Through Interconnected SaaS Apps?

websiteWing SecuritySaaS Security / Risk Management
Protect against cascading risks by identifying and mitigating app2app and third-party SaaS vulnerabilities.
Encrypted Email Service 'Lavabit' abruptly shut down under U.S. Government Pressure

Encrypted Email Service 'Lavabit' abruptly shut down under U.S. Government Pressure

Aug 09, 2013
Texas-based Encrypted Email Service ' Lavabit ' abruptly shut down for reasons linked to National Security Agency whistleblower Edward Snowden .  The Feds want to Lavabit demanding access to Ed Snowden's email. Lavabit refused! Snowden was using the Lavabit service while holed-up in the Moscow airport. Lavabit was a dedicated email service that offered subscribers " the freedom of running your own email server without the hassle or expense ." Lavabit was launched in 2004 and most recently handled service for upwards of 60,000 individuals at a rate of around 200,000 emails a day. The owner of Lavabit announced  " I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly 10 years of hard work by shutting down Lavabit, " letter posted on the Lavabit website . " This experience has taught me one very important lesson: without congressional action or a str
Cybersecurity Resources