The new front line for cyberattacks

Issue 4 2022 Information Security

Privacy relates to any rights you have to control your personal information and how it is used. Security, by contrast, refers to how your personal information is protected. Different data about you resides in multiple places for virtually everyone who is regularly online, challenging your privacy, as well as security. Some people consider privacy and security as pretty much the same thing, but, while similar, they are different, and your mobile communications should have both.

In a world replete with endless cyberattacks, IoT devices have minimal security and it is worthwhile to bear in mind that technology today can amplify the consequences of a successful data breach more than ever. With organisations and individuals alike turning in ever increasing numbers to technology for their communications and transactions, privacy and data security is becoming a necessity, especially now that corporate data exists everywhere and goes everywhere. It lives in the cloud, it travels with us on our smartphone and tablet, it’s shared on countless social media sites and who knows where else.

Worse, a great deal of the data that people and companies deal with daily – sensitive and otherwise – is transmitted over unencrypted channels, much of it “in the open” over wireless networks where the data is easily available to bad actors looking to intercept it.

For this reason,mobile communications must be secured at all costs.

Mobile is the new front line for cyberattacks

The Blackphone PRIVY 2.0 is the smartest defence for encrypted businesses and personal communications. Blackphone is designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy and mobile communications. Built to foil and protect privacy from all surface attacks and brute force, the new generation Blackphone Privy 2.0 is the world’s smartest and most secure defence for encrypted businesses and personal communications.

The Blackphone PRIVY 2.0 has been developed to address every aspect of smartphone security from the technology used to make the handset, through to the OS that runs it and the apps that can be used on it. Even how and where your data is securely held has been covered.

Features of the Blackphone

Military grade end-to-end encryption: Robust and powerful data encryption is a vital component for any security protocol used on the latest smartphones. With the next generation of Blackphone PRIVY 2.0, your communications are fully protected by a wide range of the very latest cryptographic protocols that deliver absolute data security. All your incoming and outgoing communications are secured by end-to-end encryption and only transmitted using an encrypted network. The data created is stored only on the device itself, ensuring it is fully secured and encrypted.

PRIVY Chat and PRIVY Vault: Messaging apps and unencrypted calls pose a risk to your digital communications. The Blackphone PRIVY 2.0 is delivered with preloaded applications that provide secure communications and file storage. These are PRIVY Chat and PRIVY Vault. The applications protect your data while it is in transit, with military grade end-to-end encryption, and securely store the data-at-rest in encrypted databases.

PRIVY Chat and PRIVY Vault include:

• Peer-to-peer chat.

• Secure group-chat.

• Peer-to-peer VoIP calls.

• PGP chat.

• Fully encrypted file storage

• Zero server trace storage.

Much has been written about the significant risks that are posed by tech giants storing your data and files on their own servers. They are often the target of hackers looking to exploit their infrastructure weaknesses to gain access to your information.

To address this issue head on, the Blackphone PRIVY 2.0 does not store any sensitive information from your communications. Each message created in peer-to-peer chats does not reach the locations of Blackphone’s servers. The messages created in the group chats only use Blackphone’s infrastructure to distribute the shared information. These messages are not stored for more than a week, after which they are deleted, leaving no trace.

The VoIP calls only use Blackphone’s servers to establish a connection between the peers. These privacy-focused methods have been specially developed to assure your absolute privacy.

Secure OS: The threat posed by hackers and how they operate is forever changing and evolving. Their attack methods are now using multiple endpoints and backdoors, rather than simply employing a single attack vector.

The standard consumer-grade operating systems (OS), such as Android and iOS, pay a great deal of attention to developing the user experience and functionalities, all of which comes at the expense of comprehensive security. This approach to functionality over security means that their offerings are more easily exploited by hackers. Their technical expertise and know-how mean your data is accessible to any third party that desires it.

The Blackphone PRIVY 2.0 is powered by Secure OS, which is a specially adapted operating system based on Android to focus heavily on the security factors. It deploys multiple defence layers to isolate, encrypt, and secure your data against any mobile threat.

The Secure OS deploys:

• Zero attack surface.

• Military grade encryption.

• Triple password protection.

• Verified boot.

• Trusted updates.

• Silent Phone by Silent Circle.

Silent Phone is an end-to-end encrypted application which allows users to make calls, send instant messages, and share files with other users that have the application on their device. This allows the Blackphone PRIVY 2.0 to communicate with any iOS or Android device, providing significantly wider reach and compatibility with any other secure phone.

Blackphone PRIVY 2.0 is delivered with a multi-IMSI SIM card that provides unlimited data coverage worldwide. It also includes the built-In SS7 Firewall and VPN. The SS7 Firewall helps prevent hackers from gaining access to your telephone signal as it transfers from one network to another. The VPN means that your communications are transmitted via an encrypted tunnel between you and your contact.

With these added features, it means you will be able to securely and privately communicate across the world.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
Know who’s spying on you
Kaspersky Information Security Products & Solutions
According to the latest State of Stalkerware report, 40% of the people surveyed worldwide stated they have experienced stalking or suspect they are being spied on. A solution for Android is now available.

Read more...
Cybersecurity needs 4,7 million professionals
Information Security
Despite all the efforts organisations worldwide put into preventing cyberattacks, global cybercrime has snowballed to $9,2 trillion in 2024 and is expected to grow by another 70% to $15,6 trillion by the end of a decade.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...
Dahua achieves international cybersecurity standards
Dahua Technology South Africa Information Security Surveillance
Dahua Technology has received the Common Criteria (ISO/IEC 15048) EAL 3+ certificate, along with ISO/IEC 27001 for Information Security Management Systems, ISO/IEC 27701 for Privacy Information Management Systems, and CSA STAR certifications.

Read more...
Penetration testing in 2024: Trends and predictions
Technews Publishing Information Security
In the second article on penetration testing, Christo Coetzer, CEO of BlueVision ITM, states that the effectiveness of penetration tests has evolved over the past decade, adapting to the increasing complexity of cybersecurity threats.

Read more...