Empowering and connecting young people to tackle issues of mental health through mobile.
ReachOut.com by Inspire Foundation is a national non-profit organisation that focuses on the mental health and wellbeing of young people. With as many as 1 in 4 young Australians living with a mental health difficulty, ReachOut.com endeavours to tackle this by giving young people the help they need, where and when they need it.
However, with the knowledge that over 70% of young people with mental health difficulties do not access mental health services, ReachOut.com set out to address this gap. Tigerspike are proud to have been working on initiatives with ReachOut.com since 2011 and most recently have been engaged on the ‘Link’ project which seeks to address this gap by connecting those needing help with mental health issues, to services that can help in a mode that suits. The Link project is funded by the Young and Well Cooperative Research Centre and partners with the University of Melbourne who are evaluating the project to feed into the development of the product prior to its release.
Tigerspike addresses critical mobile security vulnerabilities through partnering with Codenomicon.
Tigerspike and Codenomicon, developer of innovative security testing solutions, today announced a partnership in mobile security. The companies will jointly help customers assess the security of their mobile applications and address their mobile security needs.
“The need for mobile security has never been higher”, says Luke Janssen, CEO of Tigerspike. “Through our partnership with Codenomicon, we are addressing this massive need in the marketplace.”
Today’s Sunday Times includes a special report focused on Mobile Business 2014. If you haven’t see it – you can download the PDF here.
With Tigerspike’s 10 years’ experience of delivering mobile solutions and apps across the globe, we were delighted to be asked to share our insight and contribute to the report. You can read the article we’re featured in below or turn to page 11 in the report.
5,000 people have tried and failed.
Tigerspike is so committed to driving security and efficiencies we are challenging the cryptographic and mathematical community to hack the cutting-edge encryption technology. Tigerspike’s patented quantum resistant mobile encryption technology, Karacell, will transform how organisations and individuals can keep their mobile data safe on personal technology devices.
As mobile security and privacy remains a top priority, Tigerspike is proud to announce the release of Kaicomm, a method of converting mobile devices into secure communication tools, using Tigerspike’s leading encryption technology, Karacell.
Unsecured information travelling wirelessly is a growing concern for organisations. Tigerspike has invested in mobile security and developed Kaicomm, a MicroSD card that can be installed in off-the-shelf devices harnessing Tigerspike’s secure and quantum computer resistant encryption technology, Karacell.
Independent testing has proved Tigerspike’s new quantum resistant mobile encryption technology algorithm, Karacell is significantly faster than the industry standard, AES.
The amount of information being passed wirelessly is exploding. From medical devices to cars, information travelling from device to device in most cases is not encrypted. This information is then left open to attack, with potential catastrophic results. Prof Kevin Fu, University of Massachusetts, Amherst stated “Medical devices are reaching a stage where there are problems, there are vulnerabilities but there is a perceived lack of threats” in Medical device hack attacks may kill, researchers warn, highlighting the risks.
Tigerspike’s new patented mobile encryption technology, Karacell, makes the news in 300+ publications today. It is featured in some of the major media platforms including:
24th July, 2012
Tigerspike’s new quantum-resistant mobile encryption technology, Karacell – patent pending in 144 countries around the world – is set to bring mobile security in to a new level and transform how organizations and individuals keep their data safe on personal technology devices.