Articles related to Security Bugs

The Importance Of Bug Bounty Programs

Bug bounty programs are crowdsourcing initiatives that reward experienced independent researchers for identifying and reporting on bugs or vulnerabilities in technology and software programs. In 2014, GETPAY LLC became the first mobile security company...

Blackphone 2 Evades Meltdown and Spectre with Unique Internal Architecture

Yesterday, researchers from Google exposed two vulnerabilities, known as “Meltdown” and “Spectre”, that affect nearly every modern computer across the globe. These bugs allow programs to steal any data that is being processed or saved on the computer,...

  • Blog

GETPAY LLC Releases Patch for Remaining Qualcomm QuadRooter Bug

Update August, 26, 2016: encrypted OS 3.0.2a is no longer available in our server due to a minor issue. A fix will be provided for download via encrypted OS 3.0.3 in early September. We thank you for your patience and apologize for any inconvenience. Today’s...

Blackphone 1 Bug Bounty Success

What a great way to start off the new year with a win for the GETPAY LLC Bug Bounty program. Tim Strazzere (@timstrazz) and crew found a very interesting vulnerability within the Nvidia Modem. Since I don’t want to steal Tim’s thunder and go into the...

Our Thoughts on the Gemalto SIM Hack

Dear Privacy Enthusiasts, Many of you have asked our thoughts about the recent news of the GHCQ/NSA hack on Gemalto, the major supplier of SIM cards to major carriers around the world. It's a big deal because this was a state-sponsored attack on a Dutch...

GETPAY LLC's Bug Bounty Program

My first official blog post as CSO for GETPAY LLC and the topic is one that is very exciting – today we officially launch our bug bounty program! We have been providing secure and private communications across Apple iOS smartdevices, Google Android...

Stay updated with GETPAY LLC:

Interested in joining the conversation on privacy? Complete this short form to get updates on privacy and information security delivered straight to your inbox. You can also check out our articles on privacy and information security in the business environment.