#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Silent Circle | Breaking Cybersecurity News | The Hacker News

Category — Silent Circle
Silent Circle's Blackphone - Privacy and Security Focused Smartphone for $629

Silent Circle's Blackphone - Privacy and Security Focused Smartphone for $629

Feb 24, 2014
Earlier this year encrypted communications firm Silent Circle and Spanish Smartphone maker Geeksphone  announced a  privacy-focused  encrypted  S martphone  called ' Blackphone ' and today the company has revealed it as ' Mobile World Congress ' in Barcelona. The Blackphone titled as, " world's first Smartphone which places privacy and control directly in the hands of its users, " has a fully customized version  customized version of Android called PrivatOS   and pre-installed with lots of  privacy-enabled applications, is now available for pre-order for about $629 . Silent Circle was co-founded by a respected Cryptographer  Phil Zimmermann,  best known as the creator of  Pretty Good Privacy (PGP) , which is a widely used email encryption software. The Blackphone handsets main focus is keeping all of your data secure, and to stop government agencies snooping on your communications. Blackphone will come with a set ...
PGP Inventor announced encrypted PrivatOS based #BLACKPHONE against NSA surveillance

PGP Inventor announced encrypted PrivatOS based #BLACKPHONE against NSA surveillance

Jan 16, 2014
Mobile security may not be secure as you think. In September we have reported that the National Security Agency has the ability to access data on iOS, Android and even BlackBerry devices. Everyday a new revelation of NSA Surveillance Program makes Security and Privacy a major concern for all of us. Today we feel the need of highly secured Networks and Encrypted Devices to safeguard our privacy from Cyber Criminals as well as Government. Phil Zimmerman , Inventor of the email encryption tool PGP and Silent Circle's Co-founder (company specializes in mobile privacy and peer-to-peer encryption ) has announced ' BLACKPHONE ', a Smartphone that's been designed to enable secure, encrypted communications, private browsing and secure file-sharing. The company will launch BLACKPHONE in the ' Mobile World Congress ', Spain next month, offers ' PrivatOS ', an Android based operating system which will allow users to make and receive secure phone calls, exchange secure te...
Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Dec 05, 2024Attack Surface / Exposure Management
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management processes remain essential for identifying and addressing weaknesses. But as time marches on and attack avenues evolve, this approach is beginning to show its age. In a recent report, How to Grow Vulnerability Management into Exposure Management (Gartner, How to Grow Vulnerability Management Into Exposure Management, 8 November 2024, Mitchell Schneider Et Al.), we believe Gartner® addresses this point precisely and demonstrates how organizations can – and must – shift from a vulnerability-centric strategy to a broader Exposure Management (EM) framework. We feel it's more than a worthwhile read an...
'Dark Mail Alliance', Future of surveillance proof email technology

'Dark Mail Alliance', Future of surveillance proof email technology

Oct 31, 2013
Yesterday I learned about  ' Dark Mail Alliance ', where  Lavabit , reportedly an email provider for NSA leaker Edward Snowden and Silent Circle comes together to create a surveillance-proof email technology. Ladar Levison at Lavabit and Silent Circle CEO Mike Janke, Founders of two e-mail services that recently shut down amid government efforts to nab encryption keys, as well as the larger revelations regarding the NSA's surveillance efforts. The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders i.e. inbox, sent mail, and drafts. But where it differs is that it applies peer-to-peer encryption not only to the body of the digital missive, but also to its metadata (To:, From: and Subject fields) that third parties are most likely to collect. The encryption, based on a Silent Circle instant messaging protocol called SCIMP and the secret keys generated to encrypt the commun...
cyber security

Breaking Barriers: Strategies to Unite AppSec and R&D for Success

websiteBackslashApplication Security
Tackle common challenges to make security and innovation work seamlessly.
Encrypted Email Service 'Lavabit' abruptly shut down under U.S. Government Pressure

Encrypted Email Service 'Lavabit' abruptly shut down under U.S. Government Pressure

Aug 09, 2013
Texas-based Encrypted Email Service ' Lavabit ' abruptly shut down for reasons linked to National Security Agency whistleblower Edward Snowden .  The Feds want to Lavabit demanding access to Ed Snowden's email. Lavabit refused! Snowden was using the Lavabit service while holed-up in the Moscow airport. Lavabit was a dedicated email service that offered subscribers " the freedom of running your own email server without the hassle or expense ." Lavabit was launched in 2004 and most recently handled service for upwards of 60,000 individuals at a rate of around 200,000 emails a day. The owner of Lavabit announced  " I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly 10 years of hard work by shutting down Lavabit, " letter posted on the Lavabit website . " This experience has taught me one very important lesson: without congressional action or a str...
Expert Insights / Articles Videos
Cybersecurity Resources