Connect with us

Hi, what are you looking for?

HEADLINES

KINGMAX launches Sycret Cloud encryption card for Android smartphones

To make using the Internet of Things (IoT) and Internet of Beings (IoB) applications safer, KINGMAX launched Sycret Cloud, a portable device to encrypt smartphone data via Security IC packaging technology using encrypted multiple Sycret keys that enables safe transfer of files.

To make using the Internet of Things (IoT) and Internet of Beings (IoB) applications safer, KINGMAX launched Sycret Cloud, a portable device to encrypt smartphone data via Security IC packaging technology using encrypted multiple Sycret keys that enables safe transfer of files.

Kingmax

Google recently updated its Android platform to repair Wi-Fi network security vulnerabilities. The security patch was released in response to the discovery of hidden security issues in the Wi-Fi driver, making the phone vulnerable to hacking attacks, privilege escalation, and even the possibility of malware running software programs in the core memory of attacked mobile devices.

This development made it necessary to flash the operational systems of the affected smart phones and install software patches to repair the security gaps. Such recurring security issues make consumers worried that their smartphones could be hacked any moment, and their private or company data such as emails may be stolen.

KINGMAX’s Sycret Cloud uses secret keys so users no longer need to worry that private images or videos will be exposed or valuable information is lost after their phone or card has been lost. As such, The Sycret Cloud encryption card hopes to help render hackers powerless.

Advertisement. Scroll to continue reading.

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement