Welcome To Wolverine
Wolverine Exploration Inc.
A Nevada Corporation, symbol WOLV on the OTC:QB
News Wolverine appoints Dr. David Chalk and Richard Haderer to the Board of Directors and enters into an Agreement for the Acquisition of a 25% Interest in Enigma http://www.otcmarkets.com/stock/WOLV/news
Richard Haderer CEO Since 1996 Mr. Haderer has provided regulatory filing services to Canadian public companies. Mr. Haderer was a Listings Officer with the Alberta Stock Exchange Between 1989-1996.
Texada Consulting Inc. assists in fund raising and will provide administrative services to Wolverine through its representative Mr. Bruce Costerd. Mr. Costerd was President, Chief Executive Officer and a director of Gallery Resources Limited between 1990-2006.
David Chalk Director https://www.youtube.com/watch?v=bN2zhXhMnQw
Bill Macdonald is legal counsel for Wolverine. Mr. Macdonald is a founder and principal of Macdonald Tuskey, Corporate and Securities Lawyers, a boutique securities and corporate finance firm located in Vancouver, British Columbia established in April 2008. From February 1998 to April 2008, Mr. Macdonald was with Clark Wilson LLP and a member of the firm's Corporate Finance / Securities Practice Group where he was a partner. Mr. Macdonald is the President and a director of Blackbird Investments Inc., an oil and gas company listed on the TSX Venture Exchange.
Mr. Macdonald has a varied legal practice, focusing on cross-border and international corporate finance, securities and transactional matters. Mr. Macdonald has experience serving companies listed on the Toronto Stock Exchange, TSX Venture Exchange, CNSX and OTCBB. He has advised a variety of public and private companies on legal matters related to acquisitions, mergers, takeovers, initial public offerings, secondary financings, cross-border financings, cross-border mergers and acquisitions, public company disclosure requirements and stock exchange listings.
Mr. Macdonald's general corporate and securities practice has been focused on Canadian, U.S., Asian and cross-border public offerings, private and institutional financings (including U.S. private investment in public equity, or PIPE transactions), stock exchange listings, reverse takeovers and mergers and acquisitions. He advises numerous private and public companies on corporate governance, including compliance with the Sarbanes-Oxley Act, regulatory filings, including registration statements and periodic reports filed with the United States Securities and Exchange Commission, and corporate transactions.
Mr. Macdonald has been a member of the Law Society of British Columbia since February 1999 and a member of the New York State Bar since February 2002.
Regulatory filings will also be completed by Mr. Macdonald with the assistance of Mr. Richard Haderer. Since 1996 Mr. Haderer has provided regulatory filing services to Canadian public companies. Mr. Haderer was a Listings Officer with the Alberta Stock Exchange Between 1989-1996.
Enigma Mobile is currently in possession of the world’s only patented technology with the capability to protect against unauthorized computer intrusion and fraud.The technology having been developed over a 12-year period is completed and operational and has been substantiated by IBM’s Research Labs.Enigma now has the only ability to protect with certainty the wireless marketplace worldwide currently in excess of 6 billion devices and growing at a rate of 50% annually. Every mobile smart device in use across the globe is fully at risk of being penetrated and manipulated by unauthorized intruders, and the lack of reliable security for mobile devices is now the single greatest threat challenging the wireless device market. This document presents information regarding the current development of the ENIGMA™ App, and how it has solved and removed the underlying barrier that has prevented the development of effective Mobile Security. ENIGMA™ is the only technology capable of universally protecting any application installed on any mobile device and ensures with absolute certainty it cannot be penetrated and manipulated. The technology powering ENIGMA™ is fully patented under law ensuring there is no possibility of competing technology.
THE MOBILE SECURITY RISK
Currently more than 4 billion mobile smart devices are in use and growing exponentially as sales of smart mobile devices now outpace that of PC's worldwide. With 87% of the technology growth in this rapidly expanding mobile market (based on Amazon statistics), it is projected that by 2014 mobile internet usage will surpass that of desktop usage and more than 150 billion Mobile Apps will be downloaded in that same year. Apple alone expects to add over 500,000 new Apps to the market in 2013 and will continue to grow at a rate of 50% annually.
With this rapid growth of the mobile market, issues of security are the most cited barrier, specifically in the realm of Identity Theft. By 2015, 1 billion mobile smart device users will have the ability to tap into personal and corporate confidential data and every one of these devices will be at 100% risk.
Users of mobile devices do not often think of the consequences of their vulnerability. Simple hacking instructions can be found online and once implemented can have your every movement and location tracked. Where you go, what you do, along with your phone calls and text messages can be recorded. Manipulation of Apps can have your device working against you; your personal data can be erased or stolen, your bank account accessed and your online assets deleted. There is nothing you can do to stop a dedicated attempt to steal your information or identity. In addition to this constant threat, there is currently no technology that can stop an unauthorized intruder (otherwise known as hackers) accessing your wireless smart device; no matter the type of device or protection you may use. With cyber-crime on the rise, individuals face increased risk of financial loss and Identity Theft, as no computer system or mobile device is safe from hacking or fraud.
To illustrate the magnitude of this gap in cyber security
US Lieutenant General John Hyten, Vice Commander of Air Force Space Command, recently stated that cyber-attacks have now surpassed terrorism as the top threat to the US and the global community.
The Enigma Mobile Security App Overview
The Enigma Mobile Security App is designed to prevent unauthorized user access to various mobile devices, their operating systems and other third party apps installed on those devices.All online security systems use an Authentication Process to insure that input data is compliant and “friendly” to devices, networks, applications and enterprise business logic.
The Enigma Mobile Security App uses 3 Stages during its Authentication Process while all other solutions use only Stage 1 and 2.
Network segments, addresses, ports, and other network attributes are authenticated by routers, bridges and firewalls.
User IDs, passwords, biometrics and other user attributes are authenticated by the application or enterprise sign-on servers.
In stage three the Enigma Mobile Security App uses enterprise business logic or the application business logic to authenticate the business transactions or user request actions.
Stage 3 is Crucial
The Stage 1 and Stage 2 authentication process is very easy to by-pass, and as result, unauthorized user access to mobile devices has becomes trivial and common. The mobile device owner is unaware that unauthorized users have full access to their device.
The Enigma Mobile Security App provides the crucial Stage 3 authentication process where ALL unauthorized users are blocked from accessing the owner’s mobile device.
The Enigma Mobile Security App utilizes patented technology we call the “Causal Inference Engine” to authenticate unlimited business logic steps or states. All results are integrated with a simple and easy to use dashboard which reports the attempted access by unauthorized users.
San Jose CA
211,563,333 (Ap 14 2014)
DISCLAIMER Nothing in the contents transmitted on this board should be construed as an investment advisory, nor should it be used to make investment decisions. There is no express or implied solicitation to buy or sell securities. The author(s) may have positions in the stocks discussed and may trade in the stocks mentioned. Readers are advised to conduct their own due diligence prior to considering buying or selling any stock. All information should be considered for information purposes only. No stock exchange has approved or disapproved of the information.