• Skip to content
logo logo
  • Blog
Login SIGNUP

Sin categorizar

We have news in HushApp that we want to tell you!

April 17, 2019 by HushApp Team Leave a Comment

We have news in HushApp that we want to tell you!

We have news in HushApp! Yes, because every day we work hard to make your experience better and better, so we decided to take this space to tell you about all the improvements we have made to our web version until today.

We are constantly changing, always looking for HushApp to be easy to use and at the same time secure enough to protect the privacy of your files. That’s why our team is committed to making this app as user-friendly as possible and our mission is to keep your information safe.

What’s the news in HushApp?

Here is a summary of what we have improved for you …

  • Some changes in the transfer process: as part of the progress in the user experience, we have improved this functionality, since it is one of the most features of the app. Now the send button is active from the moment you add a file. If you click on it, it will validate the recipients and show you some warnings and indications in case they are necessary, so you know at all times what you have to do.
  • Messages at the beginning and at the end of the encryption process: When you make a transfer, a message will appear at the beginning and at the end of the process, indicating the number of files you are sending and the number of recipients that you chose. A way to better visualize what you send and who you send it to.
  • We improved the password field to transfer to unregistered users: As you know, in Hushapp you can send your files even to people who do not use the application and are still protected. To do this, you must create a password and send them by other means, so that they can receive your files securely. We have facilitated this process in several aspects:
  • Now you can see an information button, which opens a drop-down and explains what you should do when you send a message to unregistered users.
  • We also have a more descriptive placeholder, so you know where and what you should enter in this field.
  • We also added an eye icon that allows you to hide or show the password, so you can see what you write, if you are in a secure environment.
  • The history of transfers received shows you the expiration of each transfer: now you know how much time you have left to download the files that were sent to you.
  • The clickable area to add files to a transfer: A larger space to click and add your files, which makes the sending process faster and easier.
  • Improvements for companies and work teams: On this issue, at Hushapp we are working hard to improve the experience for work teams. One of the improvements is now you can send a reminder to a colleague to complete the registration process.

To explain it in simpler words, if in a company all employees use HushApp and someone tries to send a file to a colleague who has not yet completed the registration process, HushApp will send a reminder to them to activate their account, thus they will be able to receive the files in a secure way.

Take a look at our web version and feel free to leave comments on what you think about this news in HushApp!

Filed Under: HushApp News, Sin categorizar Tagged With: cybersecurity, encryption, HushApp, password, send files, send files securely, Syneidis

9 tips to use Facebook safely and not compromise your privacy

April 3, 2019 by rawtherZ Leave a Comment

9 tips to use Facebook safely and not compromise your privacy

Social media has changed the way we communicate today, but it is still controversial as far as user safety is concerned. Facebook is the best example, not only because of the immense number of users it has but also because of the conflicts that the company has experienced recently, which leaves the level of privacy of its users in question. Despite this, some are reluctant to leave the popular network, since it has become an essential way of communication for them. Therefore, the question arises: Is it possible to use Facebook safely without compromising privacy?

These questions are also raised by the imminent need of parents to protect their children, who are regular users of the popular network. However, cyber attacks become more advanced each day and anyone can be the victim of cybercrime through social media: fake news, phishing and other types of fraud frequently occur, and even the most cautious user, can fall into one of them.

It’s time to sharpen your eyesight and go one step ahead of cyber attackers, you can continue to use Facebook safely, by following some simple steps:

How to use Facebook safely? From the basic to the most advanced configurations:

1) Do not accept friend requests from strangers: The first step is to control those who have access to what you publish, therefore, by common sense, it is better to only accept people you know. It is important that parents educate children and make sure that young people do not accept requests from strangers.

2) Set up your profile so that only your friends can see your publications, you can even select specific people to see or not each publication.

3) Avoid publishing information related to your location. Some people use geolocation to show where they are on vacation for example, in any case, if you want to do so, add the photos after returning home, when you are no longer in the place you show.

4) Do not post your phone number, address, names of children or pets, this can be an easy clue for cybercriminals to guess your passwords.

5) Control who can connect with you: If you enter the section “Settings” and then “privacy”, you can control who can connect with you. There you will have several options that you can define in terms of who can see your activity and how they can contact you, for example: you have the option to receive friend requests from everyone or just friends of friends. Previously, Facebook had a “preview” option to know how your profile looked for other users. However, the same platform announced this function is disabled, due to a security incident with this tool.

6) Check the permissions of the apps and websites: In this section, you can see and control the applications and websites that you have connected to your Facebook page. You can see which ones are allowed, delete those that you do not want to use or deactivate the platform completely. If you click on each of them, you can see what kind of information that application or website accesses.

7) Report offensive content: this option is present in many sections of Facebook and serve to allow users to report offensive content, usually just look for the drop-down of the determined section and look for the option “Give Feedback”, then, a member of the Facebook security team will investigate and evaluate if it is appropriate to remove the content of the site.

8) Review in detail the section “Security and Login”: Facebook has added more layers of security to its users, especially to protect the login and prevent potential identity theft. It is important to review the available options periodically. If you go to configuration and then “Security and Login” there are different sections that are interesting and we recommend you to activate:

  • Check from Where You’re Logged In: in this section, you can see all the devices that have been connected, where and when they were connected, that will allow you to identify any suspicious activity in your account.
  • In any case, Facebook will also notify you if there is an unusual activity, such as a connection on an unusual computer. In the section “Get alerts about unrecognized logins” you can determine how you want to activate that notification.
  • You can also add two-factor authentication, either with a login code, through SMS or an authentication application of your choice.

9) Add encryption to Facebook notifications: One of the most advanced and interesting Facebook options is the encrypted notification emails. If you have them activated, you can use PGP encryption to protect these messages from possible intruders.

What can this serve you for? An example could be that for any reason you lost your password and you need to resort to the password recovery mail, with this functionality you would be ensuring that only you can read that email.

A more advanced feature that will require you to understand the encryption topic a bit more. If you succeed, you can enjoy your Facebook safely.

On the web the risks are everywhere, therefore the important thing is to improve our experience, to know the risks and advantages of each application that we use and the sites we visit.

Filed Under: HushApp News, Sin categorizar Tagged With: cyber attack, cyber attackers, cybersecurity, encryption, Facebook, hacker, hackers, phishing, two factor authentication

What is end-to-end encryption and how do we use it in HushApp?

October 23, 2018 by HushApp Team Leave a Comment

What is end-to-end encryption and how do we use it in HushApp?

Have you ever heard about end-to-end encryption? If you use applications such as Whatsapp or Telegram, you are already using this type of technology. This term has become recognizable thanks to these applications, but not only do they use this system, and besides the people who do not understand it, some have the ability to understand it is associated with a higher level of security. What is end-to-end encryption and what is it for?

What is end-to-end encryption?

Known in English as End-to-end encryption (E2EE), it is a communication system where only the users who communicate can read the messages. In principle, it prevents potential spies, including telecommunications service providers, the internet or any communication service, from accessing the cryptographic keys necessary to decipher the conversation. It is designed to overcome any attempt of surveillance or undesired alteration, since no third party will be able to decipher the data that is being communicated or stored.

To explain it in a simpler way, it is an encryption system that keeps the information protected in all phases of the process meaning that the only people who have access are the sender and the receiver.

Advantages and disadvantages

The main advantage of this type of system is to protect your information and privacy. Including anybody behind a service provider, only you and the recipient you choose will be able to access those files.

One of the great advantages is that companies that use end-to-end encryption can not deliver their clients’ text messages to authorities.

This brings a possible moral issue, that being that criminals may use such security to commit criminal activities. Although the debate may be extended, the advantages in terms of privacy may outweigh the concern of criminal activity.

Why do we use end-to-end encryption in HushApp?

Many messaging tools use this type of encryption to make communications more secure and private. However, it is important to note that this encryption system only offers a high level of security as long as it is implemented correctly. There are cases of recognized messaging companies who make promotions for using end-to-end encryption but aren’t even using it. They have suffered serious security breaches, due to the implementation they have made of this type of encryption. 

Give HushApp a Try!
BOOK A DEMO

To strengthen your security we use the passphrase, this is where we protect your files and transfers, the passphrase is the key used to authenticate the user. When you register on your device, a secret key is generated that will help you decipher the encrypted content you receive and or send.

This secret key is created and stored in the user’s device. Thus, only those who know the passphrase can recover the secret key which unlocks the content. When you log in again, you will be asked for your passphrase and the encrypted secret key will be decrypted with this same passphrase.

With HushApp you are the one in charge of giving more security to your files because the more complex the security passphrase you choose, the higher the level of protection. You can even know if your passphrase is sufficiently robust and complex to be deciphered, because the application assigns your profile a yellow (if regular) or green (if strong) shield based on this criterion.

That is why it is important that you do not forget your passphrase. Our application implements zero knowledge protocol, meaning we have no way to access your files, passwords or passphrases. So, if you cannot remember your phrase, you will not be able to recover your files.

We invite you to try HushApp …

Filed Under: HushApp News, Sin categorizar Tagged With: cybersecurity, E2EE, encryption, end to end encryption, passphrase, privacy

The best cybersecurity practices in the advertising world

July 31, 2018 by HushApp Team Leave a Comment

The best cybersecurity practices in the advertising world

Advertising agencies are becoming the focus of hackers. For example WPP was targeted by a cyber attack last year, which cost this multinational ad agency about 17 million euros. Agencies of all sizes, even boutique ones, are under attack. The reason why agencies are so attractive to cybercriminals is mainly due to the amount and type of confidential data they handle on behalf of their clients. Therefore, if the appropriate cybersecurity measures are not applied, it can result in damage to your customers and their brands.

As you know, an online marketing campaign requires very specific planning, both to carry out market research and to develop an advertising strategy. It generally includes content to be developed in tools such as social networks, email and other marketing actions to attract potential customers.

In many cases, advertising agencies compete with each other to get an important brand account. During this process, confidential proposals are exchanged which, if they fall into the hands of the competition, can mean the loss of the client, with the consequent economic impact. That is why it is important to ensure the protection of this type of files.

It is also important to secure the creative pieces, before they are approved and go out to the public. It is regrettable that this type of sensitive information reaches the hands of hackers or unfair competitors, and that the losses have a negative impact on the income and the reputation of the agency.

Some risks that may occur are:

During the market investigation it will be necessary to share sensitive information with customers, this information will determine the effectiveness of the campaign. If these data are not sent with the right tools, they could easily be vulnerable to falling into the wrong hands, including competition.

Creative content and its tools: Content marketing is fundamental in a campaign. To do this, the agencies use content management tools such as WordPress, which allow them to create content periodically (in blogs, for example) and keep information about the company updated.

Because of its ease of use anyone with a basic knowledge can manage a WordPress account, and if not properly protected, a hacker could access the site and use it to their liking, even distributing malware to users.

Email is also widely used by agencies for targeted email marketing campaigns to contacts and customers. If a cybercriminal manages to access one of these accounts, he could not only have access to the contacts of the company, but could also send fraudulent or virus-infected emails, which would result in the company’s website or emails being blocked by the clients’ servers, and poses legal, reputational and financial risks.

Social networks are also an easy and vulnerable way to attack, and in addition you should be especially careful with the information that is published in this way, because of the ease and speed of dissemination that they have, they could also be channels of distribution of false information.

To avoid reaching any of the situations mentioned above, some basic cybersecurity measures to protect the information of a marketing campaign could be:

Cybersecurity measures to apply to online marketing:

– The fundamental thing is to use a strong and unique password that is difficult to guess, for each of the services mentioned above. It’simportant to set a different password for each tool, including each social network. 

Let’s encrypt together.
FIND OUT MORE

– It is also important to periodically perform all updates to each service.

– You should avoid connecting to public Wi-Fis if you are going to use this type of tools, since the data that is being sent at the time of publication does not have the needed level of encryption protection.

– In the case of email marketing, you can use software that offers monitoring.

– Ensure that personnel who have access to these tools are aware of the threats that exist and the security measures that must be applied.

– When you need to share sensitive files that compromise the research or business proposals that you do, use applications that allow you to encrypt the information from the moment you send it until it reaches the recipient. With HushApp you can send documents easily and safely, even if your recipient does not use the application.

Cybersecurity is an issue that should concern all business sectors, it is important that all company personnel are aware of the dangers of a cyber attack. In the case of the marketing sector, where the activity is mostly online, the dangers are much more likely, taking the measures and using the right tools, you can successfully reach your ideal customers.

Filed Under: Cybersecurity Business, Sin categorizar Tagged With: cyber attack, cybercriminals, cybersecurity, email marketing., market investigation, online marketing campaign, WordPress

20 basic tips you can follow to protect your mobile

July 6, 2018 by HushApp Team Leave a Comment

20 basic tips you can follow to protect your mobile

Cyberattacks have increased at the same rate that the number of mobile devices users have, and despite this, many users are still unaware of the need for mobile cybersecurity. That’s why we collected 20 basic tips that you can follow to protect your mobile.

How to protect your mobile device?

  1. It is essential not only to install an antivirus on your mobile, but also to keep it updated.
  2. Avoid downloading suspicious applications, especially those that come from advertisements. They often extract personal information.
  3. Backup your files regularly.
  4. Do not store passwords of your credit cards, email, credentials or other sensitive information on your device.
  5. Do not trust phone calls or emails that request passwords or PIN number who pass themselves for banks identities.
  6. Access trusted websites, with secure access (https) or with a small lock in the browser bar.
  7. Close sessions each time you use applications with sensitive information, such as banks or some others with access to medical data.
  8. Like the computer, you can use incognito windows to stop your browser from saving information regarding the pages you are visiting. Your internet provider will still have access to your navigation history, but at least others will not be able to access it.
  9. Beware of open Wi-Fi, they are always useful for an emergency, but anyone can access them and your data. That’s why it is not recommended to make private or sensitive information available to unwanted entities
  10. Always download applications from the official store (Android or iOS), these platforms bring protections designed against malicious software.
  11. Control access requirements, such files, camera, photos, GPS, etc. It is not always necessary to give permission to everything requested.
  12. Install an application to find phones remotely in case of theft or loss of your device.
  13. Use an encryption system for your files, this will protect your information not only in case you lose your mobile phone, but it will also
    Start using HushApp today.
    SIGN UP
    allow you to store and share files easily.

Mobile cybersecurity for the business world:

Companies have changed their work environments, looking to be adaptable and flexible to staff needs. That’s why the use of corporate mobile devices has grown. Employees can use them outside the workplace, and manage their time in a way that best suits them. However, if they do not take the necessary security measures, the company can be exposed to a cyberattack, and if it is not handled properly, the damage can be serious.

  1. To protect company communications, employees must know the VPN connection and how to access it.
  2. In the case of corporate mobile devices, establish cybersecurity policies, infrastructure and resources to fulfill them inside and outside the company.
  3. Do not install applications on the company mobile without the authorization of the technical department.
  4. If the device is used for personal reasons, create separate accounts in order to not mix information.
  5. Use 3G or 4G connections to avoid unknown Wi-Fi, this is ideal for the company when dealing with sensitive data.
  6. The managers and employees of the company must know the risks they are exposed to in the case of a cyberattack. Therefore, blocking protocols and actions must be established in case of emergency.
  7. If you need to send sensitive or confidential information to a client or partner, it is convenient to use encryption systems. It allows you to protect files that you send until they reach the recipient you choose. The HushApp can help companies improve this process. This application protects confidential information by encrypting files sent to third parties in an easy and secure way without the need for the client to sign up.

In addition to the measures listed above, there are many others that can be applied to the business world in order reinforce mobile cybersecurity.

Filed Under: HushApp Tips, Sin categorizar Tagged With: Cyberattacks, Mobile cybersecurity, open Wi-Fi, sensitive information

How can my online law firm achieve reliability?

July 5, 2018 by HushApp Team Leave a Comment

How can my online law firm achieve reliability?

Having an online law firm requires adapting to new technologies and new populaces. As long as there is a sector that does not trust to contact via internet, another important group will seek to solve their legal problems, often through the Web itself.

Both groups share the same concerns, the confidentiality of information and the agility with which their case is resolved.

The environment faced by online law firms

To achieve trust and agility in customer service, this type of law firm must adapt to needs that arise in the digital environment:

– New business models and new legislations adapted to the field.  

– Changes in the customers’ demands, who are growing increasingly used to the speed of online procedures.

A new lawyer’s profile, with the ability to take their work to digital transformation.

Regulations on the protection of personal data (GDPR for example).

The cybersecurity of the information handled by the office.

Some aspects to consider to improve the trust in an online law firm could be:

Access: Clients seek accessibility and flexibility from the lawyers, new technologies can help the firm to improve its services, using tools that allows them to connect them easier and faster with customers: video calls, text messaging, cloud storage and other online transfers are some examples, always taking into account the security measures necessary for its use.

Globalization: The advantage of being an online firm is having the option of reaching a wider audience far beyond theits geographical area where it is located,  locationas well as facilitating contact with those who are nearby,  which would allowallows them to save hours of travel, traffic, and money.

Do not lose personal contact: It is important not to lose personalized treatment, although technology allows work to speed up. In addition,  clients should contact the lawyer easily, and generate more confidence.

Digital and secure solutions: It is also necessary to use technological tools to streamline the management of internal work to in order to facilitate communication and ensure the protection and security of customer files. It is important to implement a system that allows the encryption of the files that contain customer data andwhile implement forensuring a secure file exchange.

Applications such as HushApp can help online law firms to protect the confidential information of their clients,  in an easy and secure way. Since it allows sending encrypted files easily and there is no need for the client to sign up.

Having an online law firm should not represent a threat to the safety of customers. , otherwise, tThe good use of digital tools will generate an approach to them,offer them an approach which will allow you to adjust to each of your needs. The most important thing is to have the right channels to earn their trust.

Filed Under: Cybersecurity Business, Sin categorizar Tagged With: encryption, encryption system, exchange files, lawyer, online lawyer, protect files, send documents, send files securely, share documents.

4 Things you can do to take advantage of your HushApp contacts

June 28, 2018 by HushApp Team Leave a Comment

4 Things you can do to take advantage of your HushApp contacts

We introduced you to the HushApp contacts, one of the most interesting features of our app. It is one of the few transfer applications where you can manage your contacts in a very simple way, while also guaranteeing that your files are protected through the entire transit process thanks to its end-to-end encryption system.

HushApp contacts have a section within the application that you can easily locate in the lower section of the screen, on the left side, right next to your Hushbox. Once entered, you will be able to visualize them and we will show you how to handle them.

One of the advantages of the Android version is that it will automatically show you all the contacts you have in your phone’s calendar. This means that you don’t have to add them again; you can also add others if you want.

1) Add your HushApp contacts

When you access this section, you will have an option to add (orange button with the + symbol) located in the lower right part of the screen. There you can add your contact,. i If they are already registered to the application, just by writing the first letters of their name will appear immediately, click on the “add” button and itthis contact will alreadybe placed be among your existing HushApp contacts.

You can notice that yourYour contacts are identified in the same way in your personal agenda, it even includes their avatar, so that you can locate them easily.

2) Secure sending with your HushApp contacts

Sending files to your contacts from the HushApp is very simple, you. You just simply have to choose what you want to send from your Hushbox or upload them through the Dashboard (the purple screen located in the middle section at the bottom of the app). Then, select who you want to send the information to by clicking on the people chosen.

3) Sending to contacts that do not use the application

You can also send to acquaintances who do not use the application, you only have to add their email address in the same contacts section.

Start using HushApp today.
SIGN UP
The only step that must be taken is that you will have to add a password and send it through another source in order for them to access the information sent. This will guarantee that your files will be safe from falling into unauthorized hands.

When making a transfer from the Android version, you can add a note to any of your contacts if you wish, with the peace of mind that this note can be read only by you and your recipients.

4) Control transfers of your contacts

Another advantage of being able to manage your HushApp contacts, can be found in the  is in the “Received” tab, . Here you will be able to control the sent transfers. You can see the date and time of each transfer, and  and who sent it to you, all while having always with the peace of  mind that your files remain are safe and that nobody but you can access them.from anyone unauthorized.

Do you want to know more about HushApp? Watch this simple tutorial

Any additional questions contact us through: [email protected]

Filed Under: HushApp News, Sin categorizar Tagged With: HushApp, HushApp contacts, manage contacts., protect files, Secure sending, send files

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

necessary Always Enabled

non-necessary