Kudelski

2017-09

Lugano 20-21.Sept.2017 – Cybersecurity Symposium – Mobile interception

By |2019-01-15T18:24:06+01:00September 10th, 2017|All posts, Kudelski, Security|Comments Off on Lugano 20-21.Sept.2017 – Cybersecurity Symposium – Mobile interception

We are pleased to invite you to the next Cybersecurity & Management Challenges Symposium Lugano, 20-21 Sept. 2017 www.cmcsymposium.org Businesses and governments are acutely aware [...]

2017-08

Zürich 22 Sept. 2017 – Mobile interception: risks & countermeasures

By |2019-01-15T18:24:06+01:00August 2nd, 2017|All posts, Kudelski, Security|Comments Off on Zürich 22 Sept. 2017 – Mobile interception: risks & countermeasures

Zürich 22 Sept. 2017 Asut Lunch Forum Mobile interception: risks & countermeasures for corporate and government Interception of mobile conversations is something we have all heard about [...]

2017-08

Zürich 22.Sept.2017 – Lunch-Forum “Mobile interception”

By |2019-01-15T18:24:06+01:00August 1st, 2017|All posts, Kudelski, Security|Comments Off on Zürich 22.Sept.2017 – Lunch-Forum “Mobile interception”

We are pleased to invite you to the next Lunch Forum on 22 Sept. 2017 organized by ASUT and sponsored by Tmanco. Guest speakers from Kudelski Security [...]

2017-07

Do-it-yourself Sun Shade for mobile freedom & privacy

By |2019-01-15T18:24:08+01:00July 26th, 2017|All posts, Consulting, Kudelski, Security|Comments Off on Do-it-yourself Sun Shade for mobile freedom & privacy

Because work is an activity, not a place ! When we can’t avoid staying online, at least we can make our work pleasant and enjoy the summer. [...]

2017-02

Just How Secure Are Those Encrypted Apps…

By |2019-01-15T18:24:09+01:00February 28th, 2017|All posts, Kudelski, Security|Comments Off on Just How Secure Are Those Encrypted Apps…

An article published in Forbes magazine on Feb. 28th 2017, highlights the flaws in encrypted apps such as Signal, Whatsapp or Telegram. Thanks to its expertise, Kudelski Security [...]

2016-10

How industry meets end-users’ expectations of security, privacy and trust

By |2019-01-15T18:24:10+01:00October 24th, 2016|All posts, Kudelski, Security|Comments Off on How industry meets end-users’ expectations of security, privacy and trust

Re-inforce Security & Privacy over Untrusted Network 1) Over the top approach independent of networks and protocols. 2) Hardware Security Component Based solution scalable to millions. 3) [...]

2015-05

How to intercept mobile communications easily…

By |2019-01-15T18:24:13+01:00May 11th, 2015|All posts, Kudelski, Security|Comments Off on How to intercept mobile communications easily…

An article published by International Institute of Cyber Security on May 11th 2015 describes how easy it can be to intercept mobile communications (calls and messages). If [...]

Go to Top