• Skip to content
logo logo
  • Blog
Login SIGNUP

HushApp

Are you a cybersecurity geek? 10 signs to show that you are becoming one

October 2, 2018 by HushApp Team

Are you a cybersecurity geek? 10 signs to show that you are becoming one

Being a geek is a way of life, it’s about being passionate about what you like the most, keeping up with the latest technology, and watching all the movies and science fiction series. It also is about being aware of all details, forums or blogs that comment on your favorite topics (in addition to buying all possible gadgets and toys). But as a technology lover, you are aware of all the threats that exist on the Internet, and you have so many security measures that- wait, are you becoming a cybersecurity geek?  

We have repeated on several occasions how important it is to protect yourself against a cyberattack, and never to be paranoid enough about cybersecurity, but there may be some exceptions … If you show three or more of these signs when you protect yourself from a cyberattack, you may already be a cybersecurity geek 🙂

Are you becoming a cybersecurity geek?  

  1. Make daily backups of your data or every few hours. 
  2. Do not open attachments from NOBODY.  
  3. Do not use any social network, or if you do, use them with false name and profile photo.
  4. Use more than one antivirus for each device.
  5. Never use Windows, a good cybersecurity geek always knows not to use this operating system, even if he has the best antivirus (or more than one).
  6. Visit pages of companies or computer security organizations daily to be aware of possible threats.
  7. Establish protocols and infrastructure for a Disaster Recovery Plan (DRP) … at home.
  8. Search daily on the Internet to know what information about you is published on the web, there are even some people that have a Google Alert with their name configured. Even think of hiring a company that searches in the most remote corner of the internet to know what  private information is online and can help you erase it.
  9. Protecting your router, but not only with the basic measures such as, passwords, signal range and others. You have to go further, better, think about covering the walls of your house with layers of aluminum foil, this will drastically reduce the intensity of the signal.
  10. Place removable devices (such as USB encrypted) in secret locations that you can use to send to your recipients. Although it is a measure used by cybersecurity experts and hackers, in your day to day life, believe me, you will need to. However we have some better options for you … 

If you do some of these actions I think you better take it easy. It is not necessary for security of your confidential information to be problem for your life, there are much simpler options. We want to make your life easier, with HushApp you can keep your information safe and secured while having peace of mind that your confidential files remain safe. 

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, Cybersecurity geek, geek, hacker, hacking, HushApp

3 things you can do in the new version of the HushApp web application

September 18, 2018 by HushApp Team

3 things you can do in the new version of the HushApp web application

We have news in HushApp! We have mentioned the advantages of  the zero knowledge technology in HushApp and how incorporating a passphrase provides for additional security. The HushBox makes it easy to manage contacts by giving the option to send to HushApp users or non-users. Now we have made some improvements and we come to introduce to you the latest updates to the HushApp web application.

We have implemented high-level encryption methods, seeking a simple and transparent process for the user, without affecting the efficiency of your mobile or computer. Therefore, security, usability, and a good user experience are our priorities.

The new presentation in our web application simplifies and unifies the processes to send and share files in an easy and safe way, while still managing to follow our principles.

This is the news that we bring from the HushApp web application

After logging into the web, either with your email and passphrase or with one of the available social accounts, you will enter the main screen to make your submissions. You then will be able to attach files to send to others via email. You will also notice that you can see in the middle of the screen, the tabs of your contacts that you have previously added, and that if you wish to add an additional one in the “recipients” section, it will appear automatically. 

Start using HushApp today.
SIGN UP

When you have several contacts, you will notice a bar that you can slide to the right to see all the people added. Since they will be easily accessible, it will be painless for you to find the contacts to whom you want to send.

In addition, there is a new functionality to add contacts that are non-users of HushApp. If you would like to send documents to non-users you simply need to select the “recipients” section and create a password or passphrase. Then inform that contact of the password so that they can access your file.

Below the contacts, we have another new feature, a space to add a note, which is also sent encrypted. This new functionality is optional, but allows you to customize the message. Any details about transfer or additional information about the contents is recommended, however, HushApp users seeking to send to a non-user should not include the password or passphrase needed to access their files.

As a last step, just click on the send button and go! Your files have been sent securely, and no one other than you and the recipients you chose will be able to access the information.

People who seek to use applications prefer the process to be easy and efficient. At HushApp, we work every day so that when you need to send a secured document you can do so pleasantly and above all conveniently.

We invite you to try the new version of the HushApp web application …

Filed Under: HushApp News Tagged With: encryption, HushApp, HushApp web application, HushBox, send files, share files, zero knowledge

What is zero knowledge technology and why do we use it in HushApp?

August 31, 2018 by HushApp Team

What is zero knowledge technology and why do we use it in HushApp?

It is difficult to choose the appropriate ways to protect our information, each application may have stronger features than another. If you want to keep an intruder as far as possible away from your files, then there are options available in the market that can help you. This level of protection is known as zero knowledge technology, but, what is it? How does it work?

It is important to begin recognizing the protection type we want for our files. We have the ability to choose who does or does not access them, but our security sense depends on the trust we have in others. For example, how could we ensure that a hotel does not use the master key of your room to enter and rummage through your belongings and even steal them? There should be a method to ensure that the hotel will not use this key.

The same happens in the digital world, when entering a service, you need to enter a password. Traditionally the server already has a coded version of the password, if it matches, you can access the system. The problem is that the server also knows your password. This is where zero knowledge technology could help you …

How does it work?

Zero knowledge, or ZKP (Zero Knowledge Proof), is a protocol used in encryption systems. It is a method established for one of the parties to prove to another that a statement (usually mathematical) is true, without revealing anything other than the truth of the statement.

To put it in simpler words, zero-knowledge technology uses encryption schemes that show if someone knows something without revealing what it is. For example, this is similar to when someone knows the answer to a riddle but does not reveal the solution. How can you prove that they really know the solution?  

Start using HushApp today.
SIGN UP

There are two fundamental parts involved in this process, the “tester” who knows the information and the other, in this case the “verifier” who is convinced that the tester knows the information in question. To verify this, the ZKP protocol follows three basic properties:

Totality: the tester can provide the correct information and the verifier will be convinced of the truth of what he receives. Taking it to the digital world, a tester could be a user who places his password in an application, the application (verifier in this case) will receive the password of the tester (the user), without needing to know it.

Solidity: The only way to convince the verifier, is entering the correct information (or the correct password).

Zero Knowledge: The verifier knows that it is the correct information, but can not know the password.

A unique feature of this system is that it not only shows that it knows something to its interlocutor without revealing it, but if someone simply observes, they cannot verify or know anything about this procedure.

The interesting thing about ZKP is that it is a form of authentication where passwords are not exchanged, which means that service providers do not know anything about the data they store on their servers. It is also included in our HushApp!

HushApp and Zero Knowledge Technology

One of the most interesting HushApp features is that we use this technology to give greater protection to your confidential information. With this, you are certain that we do not have access to your information, passwords, or the files you store or send.

With this you get a more secure communication because only the user knows what he is communicating or what files they are sharing. When not storing your password, it is very important that you memorize it or keep it in a safe place, since if you lose or forget it, you will not have a way to recover it.

We invite you to protect your files easily and safely.

Try HushApp …

Filed Under: HushApp News Tagged With: encryption, HushApp, password, send files, share files, zero knowledge, Zero Knowledge Proof, ZKP

9 Cybersecurity Tips to protect corporate email from possible cyber attacks

August 27, 2018 by HushApp Team

9 Cybersecurity Tips to protect corporate email from possible cyber attacks

Email is still the best way for companies to communicate today, it is the most convenient way to send and share files. However, it is important to use with caution because many cyber-attacks that occur in companies, originate in email. A prime place where cybercriminals can get information directly from employees. To make sure your email is protected, follow these cybersecurity tips to protect your corporate email.

9 Cybersecurity tips to protect your company’s email

  1. Must ensure your employees understand the risks of a cyberattack and how to be safe so companies can cybersecurity culture in the company.
  2. Do not use corporate email for personal purposes, to avoid getting additional opportunities for unauthorized people to invade a company’s system.
  3. In case you lose your password, link your email to another alternative account, preferably another from the company. Add double factor authentication for added security.
  4. Do not post your corporate email address in forums, social media, etc.
  5. Create email accounts for different tasks, for example, using an additional account to subscribe to new services where your security policy is unknown. Having multiple accounts decreases chances of getting hacked and losing private information.
  6. Watch where you access with your email: Do not open your corporate email from networks outside the company, in case you have to do so, open a incognito window and close all other sessions.
  7. Beware of phishing: an email with malicious content is designed to deceive you, so it is important to be alert to any fraud, and analyze its content: an unknown sender, files with double extension that usually are computer worms or Trojans, even some design change could be an indication of a phishing email. If you decide to open it, check it with an antivirus.
  8. Do not respond to spam emails, you can give clues to possible attackers or scammers.
  9. Send your encrypted files: use an application to protect your files. An option can be HushApp, with which you can send and share files in a easy and secure way, it uses end to end encryption. You can also send files to contacts that do not use the application and the information will remain protected.

There is no guarantee that you will have 100% security, cybercriminals use different techniques every time to violate the company’s confidentiality, taking advantage of informing employees on proper security measures will help reduce the chances of being hacked. Therefore, the best way to defend yourself is by being aware of the risks and taking all available prevention measures. From the most complex systems you can implement to simple practices, such as these cybersecurity tips to protect email.

Filed Under: Cybersecurity Business Tagged With: computer worms, corporate email, cyber attacks, cybersecurity, email, HushApp, phishing, Trojans

Cybersecurity for employees: Creating cybersecurity culture in your company

August 21, 2018 by HushApp Team

Cybersecurity for employees: Creating cybersecurity culture in your company

As much as companies invest in sophisticated security systems, it will not help if efforts are not focused on the most vulnerable points of attack: the employees. They are the ones who access and manage the company’s information, therefore, training in Cybersecurity for employees must be part of the company’s organizational culture.

There is no doubt that companies are the preferred target of cyber attackers. These criminals take advantage of the little knowledge and carelessness of employees. With just a click, they have the ability to access the confidential data of the company. Therefore, all employees must understand the risks that exist and that may affect not only the company, but themselves.

Achieving adequate training should not only be an IT department responsibility, rather the board of directors must lead the change and be the example to follow, so that the entire team can be prepared to face any attack.

Some tips to implement training actions in cybersecurity for employees could be:

Beyond all security systems that can be implemented by the IT department, it is about training the employee regarding the proper use of each electronic device available in the company.

It is essential that employees understand the importance of using strong and unique passwords, not to leave them in plain view of anyone, not to reveal them by any media. They can also be taught to use password management tools.

Train employees to recognize safe sites to navigate, (they can look for the S of the HTTPs protocol or the lock). They can also be prepared

Give HushApp a Try!
BOOK A DEMO
for some kind of phishing or performance simulation tests them to check if they are alert for this type of attack.

Establish policies for employee mobile device usage: many companies have increased the number of corporate devices to provide flexible schedules, therefore there should be policies established that include personal devices use, if they access the company’s networks or for work management.

Implement secure and easy-to-use encryption tools: part of every employee’s day-to-day work is to share and send information to other contacts: colleagues, customers, suppliers, etc. A simple activity but that could compromise the company security if if some precaution is not taken.

HushApp is a tool that will allow employees to send files in an easy and secure way. Since it uses end-to-end encryption, they can also send to other people (as customers for example) even if they do not have the application, and they will still be protected.

Involving employees in the training

Imposing rules and restrictions will not ensure that all employees abide by them. On the contrary, it would complicate access to information. There will be slower processes and therefore greater dissatisfaction among employees. The idea is that the experience is pleasant and it becomes a habit.

Large companies are making campaigns to raise awareness among their employees about cybersecurity issues, such as Facebook, which organizes programs such as “Hacktober”, a tradition designed to build and maintain conscious culture about cybersecurity.

Marketing campaigns with contests, workshops, lectures and even games that allow not only spend a pleasant time for employees but promote good practices in the field of cybersecurity.  

INCIBE Awareness Kit to start:

The National Cybersecurity Institute (INCIBE) has anon its website Awareness Kit that incorporates multiple graphic resources, interactive elements and detailed programming to improve companies’ IT security.

Changing the behavior of an organization should not be seen as a simple list of tasks to be done, it is about creating collective awareness about the importance of training in terms of cybersecurity for employees, understanding the risks and consequences, to avoid future financial or reputational damage to the company.

 

Filed Under: Cybersecurity Business Tagged With: cyber attack, cybersecurity, encryption tools, HushApp, IT department, phishing

What you need to know to choose a good antivirus

August 17, 2018 by HushApp Team

What you need to know to choose a good antivirus

One of the first steps you must take to protect yourself from a cyber attack is to have an antivirus, the web is full of threats, so we should be prepared for any eventuality of this type. The question is: how to choose a good antivirus between many options that exist in the market? And which one best suits your needs?

The risks of not being protected are very high, the fact of not having a good antivirus, could bring serious consequences just by accessing the most common sites: an infected email or websites with malicious codes, could bring any virus type or malware such as: Trojans, a computer worm or the feared ransomware, which would allow the cybercriminal to take control of your computer and your personal information.

Each user has different needs, so it is important to define which antivirus is the one that suits you best. Follow some basic tips to protect your computer and your most important information.

How to choose a good antivirus for my devices?

Before choosing an antivirus, you must define the use that you give to your computer, so you will know the protection level you need, it is not the same an antivirus for a company to a personal one, also, if you only check the mail or social media, or if on the contrary, you use your computer for downloading videos and entering many unreliable websites. There are risk in both cases, but precaution levels can be adapted.  

Take into account the computer speed, if it is a new and fast computer you won’t have problem using a powerful antivirus, but if it is an old and slow computer, you will need a lighter program, so that it does not affect your PC efficiency.

After you determine these characteristics, you can start to choose features, which can be adapted to the computer and your budget. Also, choose an antivirus compatible with the operating system you are using.

The basics

  1. You can find on internet paid versions or the free ones, generally, the paid versions will give you many more options, analyze if it is worth making the investment. It is best to choose one with a trial version, with you can test antivirus before paying the license.
  2. It is essential that the antivirus you choose has a firewall, this will allow you to protect your device from any unauthorized access to your local network by some cybercriminal.
  3. Consider the product reputation: buy products with have good references in the market, recognized manufacturers will give you credibility and confidence, in some cases you can see awards and recognitions given by associations and specialized media, as well as the opinions of others users through forums or specialized websites.
  4. Make sure buy it at the official store
  5. Even if you have a fast computer, it is advisable to look for an antivirus that consumes few resources. A good antivirus should protect your computer without delaying processes.
  6. Choose an easy-to-use software, an antivirus must perform its work automatically, in real time and almost without you noticing.
  7. A point to value is that the antivirus has customer service, which can provide technical support in case of any problem.

Plus+ to value

  1. Some antivirus programs also offer a multiple devices license, this allows you to protect not only your computer but other devices such as your mobile phone or tablet.
  2. If you have children, you could use an antivirus with parental control, with this you can limit the children access to the internet.
  3. To reinforce your computer security, some antivirus programs bring other advanced features, for example: Protection against ransomware, artificial intelligence that updates defenses while computer attacks evolving, antispam, phishing protection, protection against banking trojans, among others. Depending on your budget, you can add it to improve your security.

HushApp: Another type of information protection

Do not think that just by choosing an antivirus you will be completely safe, the technology advances and with it the cyber attacks, si If you have more security, it will be better for your computer. The good news is there are other solutions to continue protecting your privacy, many of them are free, and will not modify the budget that you have prepared for cybersecurity.

For example HushApp, which in its FREE version allows you to store and share your most important files easily and securely, through end-to-end encryption systems and other features that will help protect your privacy.

We invite you to try HushApp…

Filed Under: HushApp Tips Tagged With: antivirus, computer worm, firewall, HushApp, information protection, multiple devices license, parental control, ransomware, Trojans

5 Cybersecurity tips you need to manage your business social media

August 9, 2018 by HushApp Team

5 Cybersecurity tips you need to manage your business social media

Social media has transformed the way people communicate. Each of them generates more and more accounts every day, for its immediacy, its ease of use and other characteristics that as we all know, make us addicted to them. Companies know that social media is an indispensable channel to reach customers. The problem is that hackers find it easy to get your information if you do not take the appropriate measures of cybersecurity for your social media.

Social media sites are nearly completely public, once you post something it is permanent. In the business world, everything exposed in social media must be handled carefully, a couple of words in a tweet could cause serious negative impact on the reputation or even the finances of the company.

A careless community manager of a company can be responsible for writing a post without thinking or reading it before giving away private information, a disloyal competitor who wants to end their reputation or even a malicious computer criminal who pretends to supplant them, trying to cheat their followers using to their name.

It is not about blaming anyone, it is better to prevent this type of situation than have to deal with it afterwards. It is crucial to start with some basic ideas that can reinforce the protection of your social media.

5 tips of Cybersecurity for business social media

  1. Add two-factor authentication to your social media, do not stay with a single password, you can increase security by using a
    Start using HushApp today.
    SIGN UP
    second option with a personal question or by sending a password to a mobile device that you have linked to your social media account. You can also use it for your personal networks.
  2. Assign devices to management business social media: just like the two factor authentication, manage corporate networks from devices only destined to corporate accounts.
  3. Configure the privacy options of each network: each one allows you to decide what you want to show and what not.
  4. Control who has access to social media: The more people who have access to the company social media, the risk becomes greater, assigns administrators and controls their permissions and access, especially if this work is carried by an external person to the company. In the case of Facebook, you can assign different roles, be sure to eliminate access to former employees or former account administrators.
  5. The fundamental idea of business social media is to promote a product or service of your company, and thus have a closer contact with your customers. If you plan your marketing strategy well, surely you will have quite effective results, but do not forget cybersecurity. If you create a social media campaign, make sure that this information (arts, texts, special promotions, etc.) does not reach unwanted people before the time you decided to publish. Use applications such as HushApp, which will allow you to protect your files easier and safely, so that your campaign will be a success.

There is no doubt that social media has become an essential tool for companies, especially SMEs, but they are also a key focus for cybercriminals, the ideal is to use them responsibly to ensure the success of the company in the digital world.

Filed Under: Cybersecurity Business Tagged With: business social media, cybersecurity, HushApp, marketing strategy, privacy options, social media, two factor authentication

Why use a passphrase instead of a password?

July 19, 2018 by HushApp Team Leave a Comment

Why use a passphrase instead of a password?

As technology changes and advances, so do cybercriminals. That is why every day sites on the internet, softwares and applications are required to ask users to strengthen their passwords. This is because, users continuously make the same mistakes, using a password that hackers can easily discover.

According to Google’s global data, 68% of people use the same password for different accounts, only 46% change it at least once a year, and 91% use a password that is in the top 1000 most common passwords in the world. This goes to show that we still do not know the magic formula to remember a strong and unique password.

Remembering all of our different passwords is growing more difficult: increased length, numbers, capital letters, lowercase letters, and symbols make it difficult to not make mistakes, or forget. Thankfully, there is a better option: how about we use a passphrase?

Passphrase: what you need to know

A passphrase is nothing more than a phrase that works like a password. It is commonly used in the encryption of access to some software or other electronic systems. Unlike the password, they are much easier to remember.

Not all applications or software have this feature, but you can choose this option if the service allows it, especially when you need to protect the content of the information you want to share. The rest of this article will be dedicated to offering some simple tips that will help you  build a safe and easy to remember passphrase.

Like passwords, passphrases must have a certain level of complexity, or at least creativity, something that makes it unique and that only you will remember. Although this principle is repeated when you create a password, in the case of a phrase it may make more sense than a set of symbols, numbers and letters. Therefore, avoid using familiar phrases such as excerpts from songs, books or popular culture.

Do not repeat the phrase, remember that a password is like a key, you do not use it to open the same room. With the passphrase it will work the same, use a different phrase for different services.

Also, do not share the method you used to create it, it may be a clue you give to hackers to guess your phrase.

HushApp: Passphrases to send your files easily and safely

Now that you know you have this option, you will wonder where you can use it. In HushApp the passphrase has a leading role to protect your privacy. Here you can encrypt your files and store them in in your Hushbox. You will only be able to access your files using the passphrase you have selected.

Start using HushApp today.
SIGN UP

You can also send your files to contacts you have selected, whether they use the application or not. In case you do not use it, you will also create a passphrase especially for them and send it to the recipient by other means. This way, you make sure that your information is completely secure.

Passwords have a vital function within the scope of cybersecurity, choosing the right one is crucial when stopping our information from falling into the wrong hands. The passphrase is an option to further improve the security and protection of your data, provided you give it the appropriate use.

Filed Under: HushApp News Tagged With: cyber attack, cybercriminals, hackers, HushApp, Passphrases, password

4 Things you can do to take advantage of your HushApp contacts

June 28, 2018 by HushApp Team Leave a Comment

4 Things you can do to take advantage of your HushApp contacts

We introduced you to the HushApp contacts, one of the most interesting features of our app. It is one of the few transfer applications where you can manage your contacts in a very simple way, while also guaranteeing that your files are protected through the entire transit process thanks to its end-to-end encryption system.

HushApp contacts have a section within the application that you can easily locate in the lower section of the screen, on the left side, right next to your Hushbox. Once entered, you will be able to visualize them and we will show you how to handle them.

One of the advantages of the Android version is that it will automatically show you all the contacts you have in your phone’s calendar. This means that you don’t have to add them again; you can also add others if you want.

1) Add your HushApp contacts

When you access this section, you will have an option to add (orange button with the + symbol) located in the lower right part of the screen. There you can add your contact,. i If they are already registered to the application, just by writing the first letters of their name will appear immediately, click on the “add” button and itthis contact will alreadybe placed be among your existing HushApp contacts.

You can notice that yourYour contacts are identified in the same way in your personal agenda, it even includes their avatar, so that you can locate them easily.

2) Secure sending with your HushApp contacts

Sending files to your contacts from the HushApp is very simple, you. You just simply have to choose what you want to send from your Hushbox or upload them through the Dashboard (the purple screen located in the middle section at the bottom of the app). Then, select who you want to send the information to by clicking on the people chosen.

3) Sending to contacts that do not use the application

You can also send to acquaintances who do not use the application, you only have to add their email address in the same contacts section.

Start using HushApp today.
SIGN UP
The only step that must be taken is that you will have to add a password and send it through another source in order for them to access the information sent. This will guarantee that your files will be safe from falling into unauthorized hands.

When making a transfer from the Android version, you can add a note to any of your contacts if you wish, with the peace of mind that this note can be read only by you and your recipients.

4) Control transfers of your contacts

Another advantage of being able to manage your HushApp contacts, can be found in the  is in the “Received” tab, . Here you will be able to control the sent transfers. You can see the date and time of each transfer, and  and who sent it to you, all while having always with the peace of  mind that your files remain are safe and that nobody but you can access them.from anyone unauthorized.

Do you want to know more about HushApp? Watch this simple tutorial

Any additional questions contact us through: [email protected]

Filed Under: HushApp News, Sin categorizar Tagged With: HushApp, HushApp contacts, manage contacts., protect files, Secure sending, send files

Meet HushApp: 3 things you can do with your HushBox

June 22, 2018 by HushApp Team Leave a Comment

Meet HushApp: 3 things you can do with your HushBox

Previously we introduced you to the HushApp, a web and mobile application that helps you send and store any file in an easy and secure way, but how? The answer lies within the multiple features that the app possesses. One such example is end-to-end encryption, which gives your files a heightened level of security. Another feature exclusive to the Android version is the HushBox. Further down we will explain the three things you can do with HushBox to effectively protect your data.

When you enter the application your first access point will be the Dashboard, a purple screen from where you can send your files. At the bottom of the screen the different sections available to you will be visible, the icon further to the left will take you to the HushBox.

What can I do there?

3 things you can do with your HushBox

 

Save files

Encryption is easy with HushApp!
DOWNLOAD

When you enter, you will find a space where you can safely store all kinds of files: photos, videos, presentations, documents, etc. These files will remain encrypted in the device, ensuring that nobody but you can access the information within.
One of the advantages of the encryption method used by HushApp is that it encrypts files separately, which gives you both a higher level of security and easy access to individual files. You can open a document to view it, and when you finish, it will remain protected.

How to save them?
When you access this section you will have an option to add (orange button with the + symbol) where you can select folders or files on your device that you want to protect.

To get more out of your HushBox, when making a transfer, you have the option to choose to have that file automatically saved securely.

Sharing files

Sharing files securely from the HushBox is a simple action. You only have to click on the document options (the three points above and to the right) and choose “share”. Select the contacts you want to send your files to (even if they do not have the application, you can add their email address) and voila! your files were shared safely, and only those who you have chosen can access them.

Organize files

In the received tab, you can control the transfers that your contacts send you. These files will be saved in the inbox folder of your HushBox. From there you can organize them by folders as you decide with the peace of mind that all your information is still protected.
In HushApp, only you have control. Do you want to know more about how it works? Watch this simple tutorial. 

Any additional questions contact us through: [email protected]

Filed Under: HushApp News Tagged With: encrypted files, encryption, HushApp, HushBox, Save Files, Sharing Files

  • « Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Next Page »
logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled