21 Apr 2016

Phone Hacking Is Easy and All Phones Are Vulnerable

With just a phone number, hackers can hear and record voice conversations, track a person’s whereabouts, read text messages, spy on a person, and steal information — such as contacts data, giving hackers the phone numbers of others for additional malicious actions.

In the investigation conducted by the CBS News Network, which aired "Hacking Your Phone" on the 60 Minutes television program, hackers quickly and without detection intercepted and recorded a congressman’s phone conversation by just knowing his phone number.

Author: TCC
0 Comments

25 Mar 2016

TCC’s CipherTalk® Makes Mobile Voice and Text Communications Anonymous

The CipherTalk secure smartphone provides military-grade full-circle protection for all aspects of mobile phone talk and text communications, including an innovative ability to ensure user anonymity. The entire voice and text messaging connection procedure is hidden, and no user data or call logs are generated, collected or stored. Whom and when a user is calling, and where they are calling from, is only known by the user.

Author: TCC
0 Comments
RSS
Cipher One

CipherONE® Optimized Network Encryption

Our solutions meet TCC's CipherONE Optimized Network Encryption best-in-class criteria for maximum cryptographic strength, and are optimized for performance and ease of use for our customers.

Read More