• App
  • Enterprise
  • Connectors
  • SDK/API
Let's Talk

CEERUS.APP

A free enterprise grade secure communications app for voice, video and messaging.

Google Play

Apple AppStore

CEERUS.ENTERPRISE

Quickly and easily create a secure bubble that you control around your entire communications infrastructure.

Applications

Case Studies

Enterprise Docs

CEERUS.CONNECTORS

Extend your security bubble to third party apps and services.

Applications

Documentation

CEERUS.SDK/API

Build a proven security stack into new and existing apps with minimal coding and development.

Applications

Case Studies

API Documentation

  • Security
  • About Us
  • Contact
  • Specs + Docs
  • Articles
  • Secondary Links
  • Case Studies

CEERUS.APP

A free enterprise grade secure communications app for voice, video and messaging.

Google Play

Apple AppStore

CEERUS.ENTERPRISE

Quickly and easily create a secure bubble that you control around your entire communications infrastructure.

Applications

Case Studies

Enterprise Docs

CEERUS.CONNECTORS

Extend your security bubble to third party apps and services.

Applications

Documentation

CEERUS.SDK/API

Build a proven security stack into new and existing apps with minimal coding and development.

Applications

Case Studies

API Documentation

  • Security
  • About Us
  • Contact
  • Specs + Docs
  • Articles
  • Secondary Links
  • Case Studies

Coming Soon

Ceerus glossary

Data Retention

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…

Multimedia Internet KEYing (MIKEY)

Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to set up encryption keys for multimedia sessions that are secured using SRTP, the security protocol commonly used for securing real-time communications such as VoIP.

Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). This is an Identity-Based Authenticated Key Exchange method. Read more…

SS7 Attacks

SS7 (Signaling System No. 7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network (PSTN). The protocol also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other services.

In 2008, several SS7 vulnerabilities were published that permitted the tracking of cell phone users. In 2014, the media reported a protocol vulnerability of SS7 by which anybody can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller's carrier release a temporary encryption key to unlock the communication after it has been recorded. Read more…

Eavesdropping

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. The practice is widely regarded as unethical, and in many jurisdictions is illegal.
Read more…

Phishing Attacks

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Read more…

Related

  • Data Retention
  • Mikey-Sakke
  • SS7 Attacks
  • Eavesdropping
  • Phishing Attacks

CEERUS.APP

A free enterprise grade secure communications app for voice, video and messaging.

Google Play

Apple AppStore

CEERUS.ENTERPRISE

Quickly and easily create a secure bubble that you control around your entire communications infrastructure.

Applications

Case Studies

Enterprise Docs

CEERUS.CONNECTORS

Extend your security bubble to third party apps and services.

Applications

Documentation

CEERUS.SDK/API

Build a proven security stack into new and existing apps with minimal coding and development.

Applications

Case Studies

API Documentation

Contains public sector information licensed under the Open Government License v2.0.
Registered offices: Cannon Place, 78 Cannon Street, London EC4N 6AF

  • Privacy Policy
  • Terms and Conditions
  • Contact Us