SafeUM
Home
Blog
Services
Download
Help
About
Recharge
Blog
Services
Download
Help
About
Recharge
Menu
Archive
TOP Security!
30 Dec
2015
Common payment processing protocols found to be full of flaws
30 Dec
2015
Can you hack a train?
30 Dec
2015
Vulnerable Joomla servers see 16,000 daily attacks
29 Dec
2015
ProxyBack malware turns infected computers into internet proxies
29 Dec
2015
Vulnerability in AVG security toolbar puts IE users at risk
29 Dec
2015
Database configuration issues expose 191 million voter records
28 Dec
2015
Botnet of Aethra routers used for Brute-Forcing WordPress sites
28 Dec
2015
North Korea's paranoid computer operating system revealed
28 Dec
2015
NSA helped British spies find security holes in Juniper Firewalls
25 Dec
2015
Cybersecurity predictions for 2016
25 Dec
2015
How to use passwords: 10 simple rules
25 Dec
2015
How to protect your money from online fraud
24 Dec
2015
Hyatt hotel says payment systems hacked with credit-card stealing malware
24 Dec
2015
130 celebrities' email accounts hacked
24 Dec
2015
Vulnerabilities found in common web apps
23 Dec
2015
Oracle ordered to publicly admit misleading Java security updates
23 Dec
2015
Lost devices account for bulk of healthcare security incidents
23 Dec
2015
Parents warned as Hello Kitty data breach leaks details of 3.3m user accounts
22 Dec
2015
Target back on naughty list with another security vulnerability
22 Dec
2015
Researcher reveals Chinese e-crime shopping list
22 Dec
2015
FBI admits it uses hacker tools to investigate crimes
21 Dec
2015
Obama says the feds vet social media before issuing visas
21 Dec
2015
Snowden doubts security of Telegram
21 Dec
2015
A secret catalogue of government gear for spying on your cellphone
18 Dec
2015
Outlook letterbomb exploit could auto-open attacks in e-mail
18 Dec
2015
Over 680TB of data exposed in MongoDB databases
18 Dec
2015
You can hack into a Linux computer just by pressing Backspace 28 times
17 Dec
2015
When a single e-mail gives hackers full access to your network
17 Dec
2015
Hackers threaten Christmas takedown of PlayStation and Xbox
17 Dec
2015
Wireless Routers plagued by unpatched flaws
16 Dec
2015
Hacker confirms PlayStation 4 jailbreak
16 Dec
2015
Online payments at risk as banks fail to secure transactions
16 Dec
2015
Companies accuse their competitors of staging DDoS attacks against them
15 Dec
2015
Hackers exploit critical vulnerability in sites running Joomla
15 Dec
2015
MacKeeper exposes personal data of 13M users
15 Dec
2015
Massive ransomware campaign using TeslaCrypt discovered
14 Dec
2015
Twitter warns over potential state-sponsored hack
14 Dec
2015
Twitter will finally start making money off people without Twitter accounts
14 Dec
2015
Cybercriminals will target Apple in 2016
11 Dec
2015
Java deserialization vulnerability found in more Java libraries
11 Dec
2015
Microsoft warns of possible attacks after Xbox certificate leaked
11 Dec
2015
Attack floods Internet root servers with 5 million queries a second
10 Dec
2015
Kaspersky Lab, McAfee, and AVG all vulnerable to major flaw
10 Dec
2015
Rootnik Trojan modifies legitimate root tool to hack Android
10 Dec
2015
Unknown copycat using Armada Collective name for DDoS extortions
9 Dec
2015
Dell, Toshiba, and Lenovo PCs at risk of bloatware security flaws
9 Dec
2015
8 security rules for public Wi-Fi users
9 Dec
2015
McAfee Enterprise Security Manager failed to manage own security
8 Dec
2015
Nemesis bootkit is a new stealthy payment card malware
8 Dec
2015
Patched security flaw exposes 6.1 million IoT
8 Dec
2015
France looking at banning Tor and blocking public Wi-Fi
7 Dec
2015
Chinese government has arrested hackers it says breached OPM database
7 Dec
2015
Voice over 4G and Wi-Fi is in Russia can not be transferred because of FSB standards
7 Dec
2015
The app around the corner
4 Dec
2015
This new ransomware steals passwords before encrypting files
4 Dec
2015
Contents of Calyx National Security Letter revealed
4 Dec
2015
The wrong way to use passwords
3 Dec
2015
Adobe is telling people to stop using Flash
3 Dec
2015
Every third company uses mobile devices for financial transactions
3 Dec
2015
10 tips to protect your files from ransomware
2 Dec
2015
Greek banks hit by bitcoin ransom demand
2 Dec
2015
This stealthy Point-of-Sale malware could steal your Christmas
2 Dec
2015
UK spy agency GCHQ admits it carries out computer hacking
1 Dec
2015
Hack of toy maker VTech exposes families
1 Dec
2015
Telegram metadata allows for stalking anyone
1 Dec
2015
Millions of IoT devices using same hard-coded crypto keys
Year
2015
January
February
March
April
May
June
July
August
September
October
November
December
SafeUM
27 Apr 2017
Encrypted Group Chat
4 Apr 2017
Each SafeUM user gets free anonymous phone number
10 Mar 2017
SafeUM useful features to help you feel safe
28 Sep 2016
Secure Messenger SafeUM
21 Jul 2015
New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015
We are beginning to test SafeUM for Windows Phone
25 Feb 2015
SafeUM messenger is available for public testing
20 Feb 2015
Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015
New "TOP Security!" app is on the App Store
22 Jan 2015
Free "TOP Security!" app is available on Google Play
28 Oct 2014
How are security keys generated in SafeUM?
19 Jun 2014
SafeUM is the best messenger for data protection and information security
16 Jun 2014
Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014
Why Premium secure messenger SafeUM cannot be free
25 Apr 2014
Encrypted secure messaging for every mobile device
All news