Secure Channels Inc

(855) 825-6766

December 24, 2014

No Comments

keith

Secure Channels announces a legendary addition

We are proud to announce Keith Erickson will be a member of the Secure Channels Team.

“Keith is an exciting asset for Secure Channels. He exemplifies a singular ability to understand problems while simultaneously encompassing a team approach to solving them.” says Richard Blech, CEO of Secure Channels.

Keith Erickson is nothing short of a legend. Keith’s background includes playing for the legendary Coach John Wooden at UCLA, where he was an integral part of Wooden’s first two NCAA Championship teams. Coach Wooden said of Keith” He is the best athlete that I ever coached.”  Keith went on to be on the US Men’s Olympic Volleyball team and playing for the 1972 Los Angeles Lakers NBA Champion team. The Lakers won 33 consecutive games; this 1972 streak was the longest winning streak in professional sports history.

Secure Channels welcomes our legendary addition and looks forward to an exciting collaboration.

Keith will be working with Business Development and as a Technology Evangelist with Secure Channels.

December 23, 2014

No Comments

High-Tech Hijacking at Sony: by Richard Blech

A group calling itself Guardians of Peace allegedly hacked into the Japanese owned media and movie conglomerate Sony Pictures last month, successfully stealing large files containing personal data on celebrities, as well as “company secrets”, threatening to release the information to the public if its demands were not met. Guardians of Peace’s identity is yet to be confirmed, however what is known is that sensitive personal information, like the social security numbers, salaries and addresses of more than 47,000 Sony stars and employees, was successfully breached. Hackers also gained access to details of professional contracts, upcoming movie releases and other ‘inside information’, some of which has already been leaked to the public.

December 19, 2014

No Comments

Discovered Flaw leaves Back Door with Cell Phone Calls

Recently The Washington Post printed an article written By Craig Timberg

“German researchers discover a flaw that could let anyone listen to your cell calls.”

http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/

I have a few thoughts on the bowing towards the limitations of SS7 when we have the technology and means to stops the breaches in their tracks…Super Encryption is the answer. The cell phone calls need to be encrypted once with the carrier and once with patented encryption

The article reads “ For calls or texts transmitted using strong encryption, such as is commonly used for advanced 3G connections, hackers could request through SS7 that each caller’s carrier release a temporary encryption key to unlock the communication after it has been recorded:”

The ‘temporary’ key will only reveal the first encrypted layer. The Patented encryption layer will still be left leaving useless bits and bytes. The reality is the technology already exists to leave this “new found” security flaw yesterday’s news. With the dizzying amount of breaches, the country has started to accept that breaches are the price we pay for the speed of advanced technological society. But, it simply isn’t true. We have the ability now; we simply have to apply it.

December 3, 2014

No Comments

Secure Channels Announces SUBROSA

SCSUBROSA1

Secure Channels Announces SUBROSA, a New Form of Key Generation and Authentication Technology.

SUBROSA Creates Passwords From Segments of Any File Type, Making the Password Simple to Remember, but Long and Complex as a Security Format.

IRVINE, CA, Dec 03, 2014 (Marketwired via COMTEX) — Secure Channels, Inc., a new cyber-defense firm creating robust, and state-of-the-art patented encryption technologies, today announced the availability of SUBROSA(TM), the company’s Simple User Based Resource Orientated Segmentation Architecture. SUBROSA is an advanced form of key generation and an authentication paradigm for deployment in hardware, as a software product and within web services.

 

December 2, 2014

No Comments

SCSUBROSA1

Time to Paradigm Shift Passwords by Richard Blech

Paradigm, a theory or a group of ideas on how something should be done, made, or thought about. This is exactly applicable to the current state of vulnerability that all of us face, with the current methodology of alpha-numerical passwords. A recent article from RawStory breaks the reasons why we are so exposed with our easy passwords to hackers: http://www.rawstory.com/rs/2014/12/the-big-password-mistake-hackers-are-hoping-youll-make/

One of the most prominent security vulnerabilities facing computer users today is user maintained passwords or keys. The reason I say ‘user maintained’ is the present paradigm requires the user to ‘remember’ their key for future use and, unfortunately, the average human brain just doesn’t remember complex patterns all that well.