Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/2/2020
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Free Mobile App Measures Your Personal Cyber Risk

New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis.

A new free mobile app continuously tracks the security of smartphone users and scores whether they are at low, medium, or high risk for a security incident or breach.

Cyber risk vendor Lucideus today rolled out the app for Android and iOS, called SAFE Me. Saket Modi, the company's CEO, says the SAFE Me score, based on the Security Assessment Framework for Enterprise (SAFE) developed jointly with MIT, ranges from 0 to 5, with 0 being a high risk for a breach and 5 signifying the highest level of security. The scores are based on a combination of factors, including device security posture, exposure on the Dark Web, and cybersecurity awareness based on courses and quizzes.

Related Content:

Security & Trust Ratings Proliferate: Is That a Good Thing?

The Changing Face of Threat Intelligence

New on The Edge: SASE 101: Why All the Buzz?

"We decided to come out with this because people may be tech-savvy, but they don't always know about the security of their devices or applications," says Modi. "Since something like 90% of breaches are caused by a human element, we've designed a solution that empowers consumers to easily monitor and understand their cyber risk across all their devices and the digital platforms they frequent such as Google, Twitter, or Facebook."

Jack Kudale, founder and CEO of Cowbell Cyber, points out that the human element always serves as the weakest link in any cyber protection program. "We welcome any initiative that brings cyber awareness to consumers, potentially helping businesses get a better grasp of their overall cyber risks if employee privacy concerns are properly handled," he says.

The app is the latest tool in this age of security scoring systems, most of which center around the security posture of businesses and organizations. Security experts warn that security and risk ratings of  also come with the risk of oversimplifying an organization's security posture, or a false sense of security, experts say. 

Upgrades

SAFE Me app comes in three flavors: Basic/Free for individuals, Enterprise, and Platinum. The Enterprise version - for companies - costs $36 a year per user and lets the user register five email IDs, while Enterprise also comes with unlimited cybersecurity awareness courses and an unlimited Deep- and Dark Web exposure scan.

SAFE Me interface
SAFE Me interface

The high-end Platinum version costs $10,000 per year per user and has been designed for CEOs and top executives at companies. Platinum customers can use an unlimited number of email IDs and get personalized security training campaigns. The system also analyzes an executive's security across all his or her devices, including their mobile phone, digital watch, smart TV, or smart car.

"We teach executives how to think about security across all their devices so their communications can't be intercepted if they are at home or in the car," Modi explains. Top executives don't have to pay for the Platinum version to get access to Enterprise. For example, if a small company only wanted 10 licenses of Enterprise at $36 per year per user that would cost $360 annually.

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23396
PUBLISHED: 2021-06-17
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
CVE-2021-32681
PUBLISHED: 2021-06-17
Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`Ch...
CVE-2013-20002
PUBLISHED: 2021-06-17
Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.
CVE-2020-19202
PUBLISHED: 2021-06-17
An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected p...
CVE-2020-35373
PUBLISHED: 2021-06-17
In Fiyo CMS 2.0.6.1, the 'tag' parameter results in an unauthenticated XSS attack.