Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
A conversation with Michael Campbell and Steve Trevino heading into SOF Week 2023
SOF Week provides the opportunity to discover and explore solutions for some of our nation’s...
6 minute read
Privoro-Samsung partnership provides trusted control over smartphone radios and sensors
We’re excited to share that Privoro and Samsung have partnered to provide a powerful new security...
2 minute read
A spyware operator’s POV
The PBS documentary series Frontline recently aired a two-part look at the Pegasus Project from the...
1 minute read
Mike Fong on Chambers Talks
Privoro founder and CEO Mike Fong recently participated in a cybersecurity-focused discussion with...
1 minute read
All eyes on mobile
Of all the data points contained in Zimperium’s recently released 2022 Global Mobile Threat Report,...
1 minute read
The powerful incentives for developing smartphone spyware
A recent investigation by Ronen Bergman and Mark Mazzetti in The New York Times Magazine opened the...
1 minute read
Mind your smartphone location breadcrumbs
The location data we give up in using certain apps can be used by third parties to track our...Traveling abroad on business? Assume that your smartphone will be compromised.
When visiting certain high-risk countries on business, your smartphone activity may be monitored by...The future of hardware isolation for mobile device security
SafeCase, our smartphone-coupled security device, serves as an ExoComputer: a secondary,...Pegasus Project investigation uncovers the reach and implications of NSO Group spyware
On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the...
2 minute read
Mobile security is serious business
Verizon recently released its annual Mobile Security Index, an always-anticipated snapshot of...
2 minute read
Protecting High-Level Personnel from IMSI Catchers
In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington,...
5 minute read
Mobile Security,
Smartphone Vulnerabilities,
Mobile Tracking,
Data Privacy Day,
Surveillance capitalism
Data Privacy Day
Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being...
1 minute read
Privoro awarded expanded agreement with the U.S. Air Force
I’m pleased to announce that Privoro’s agreement with the U.S. Air Force was recently expanded in...
1 minute read
Children, smartphones and the surveillance economy
For many children, smartphones are a gateway to greater independence and a more fulfilling social...
3 minute read
Remote work is here to stay — cybersecurity needs to catch up
I have long believed that digital transformation allows enterprises to quickly recognize and adapt...
3 minute read
Lack of emphasis on secure teleworking is a national security risk.
Commercial mobile devices without proper protections are creating risks to our National Security.
2 minute read
The spies in our cell networks
CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out...
1 minute read
Mobile Security,
Privoro,
JC2 Ventures,
Connecting the Dots,
John Chambers,
Trusted Hardware,
Mike Fong
The importance of trust in leading a market transition
As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets...
3 minute read
Mobile Security,
Smartphone Hacking,
Smartphone Vulnerabilities,
Smartphone Security,
Corporate Espionage,
spyware
A quick update on 2019 mobile predictions made in January.
So far this year, the surreptitious capture of audio and visual data via smartphone cameras and...
4 minute read
How Apple shapes the narrative about smartphone security.
In August, we conducted our annual survey designed to gauge attitudes about mobile security and...
1 minute read
Mobile Security,
Government Security,
Data in Vicinity,
Security Enterprise Services,
Cyber Security News
Thinking like a smartphone eavesdropper.
Think of the last time you received a sensitive piece of information. Perhaps it was news of a...
1 minute read
Lawmakers’ smartphones and the battle of information.
There's a war out there, old friend. A world war. And it's not about who's got the most bullets....
1 minute read
Mobile Security,
SafeCase,
Mike Fong,
Blue Force Tracking,
Air Force,
SBIR,
Small Business Innovation Research,
USAF
Privoro announces Air Force contract.
I’m happy to share that the Air Force, through its Small Business Innovation Research (SBIR) programInfographic: Smartphone sensor security.
Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a...
1 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
JC2 Ventures,
Connecting the Dots,
John Chambers,
Trusted Hardware
The piece of hardware at the cutting edge of cybersecurity.
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco As a mentor,...
3 minute read
Infographic: Smartphone ban and workplace security.
In our discussions with federal employees working under smartphone bans at the Pentagon and other...
1 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Smartphone Security,
spyware,
SafeCase,
Data in Vicinity,
Smartphone Anti-Surveillance
6 bold predictions for smartphone security in 2019.
In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on...
4 minute read
SafeCase and beyond; safeguarding smartphone data.
Last month, we released our second-generation product, the Privoro SafeCase, which is compatible...
6 minute read
How smartphone espionage can disrupt an election.
The mobile security of political candidates and their staff gets lost in the shuffle when...
3 minute read
Smartphone Vulnerabilities,
China,
Supply Chain Attacks,
Supermicro,
Bloomberg Businessweek,
Supply Chain Security,
Supply Chain Risk
Demystifying the hardware supply chain for smartphones.
Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation...
4 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Data Privacy,
Smartphone Security,
spyware,
SafeCase
Why does the world need a SafeCase?
We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
Voice Security,
IoT Security,
JC2 Ventures,
Connecting the Dots,
John Chambers
Voice is the next interface, but what does that mean for mobile security?
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco Ten years...
3 minute read
Is your smartphone safe from surveillance in 2018?
We conducted our second annual survey on attitudes about smartphone privacy and security on August 1
1 minute read
Global SOF Modern Warfare Conference recap.
Privoro recently attended the GSF Modern Warfare conference at Fort Bragg, home of the 82nd...
1 minute read
Privoro celebrates National Dog Day.
On Sunday, August 26th, the country will celebrate National Dog Day. Sure, this day was chosen to...
1 minute read
Smartphones becoming hackers' favorite target.
Our world is filled with news and conversations about hacking. From well-publicized public hacks...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
SCIF Security,
SCIF Spaces,
Secure Spaces,
Government
Pentagon smartphone security policy.
Pentagon’s smartphone policy costs taxpayers an estimated $2 million per day
2 minute read
Why you’ll pay for digital privacy in 2019.
Current State Everything we do, everywhere we go, a data trail is following us, recording our...
3 minute read
Mobile Security,
Mobile Espionage,
Data Privacy,
Cybersecurity,
Smartphone Security,
Corporate Espionage,
Enterprise
Corporate espionage has gone mobile and gotten personal.
Economic espionage – also known as industrial espionage, corporate espionage and corporate spying...
4 minute read
Privoro says RIP to passwords and hello to better security on #PasswordDay.
As the internet uses #PasswordDay to celebrate and patronize the 1961 Massachusetts Institute of...
4 minute read
Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.
Over the last couple of years I’ve become much more security- and privacy-focused. Why?
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Cyber Hygiene
Cybersecurity tips. Part 3: Digital hygiene.
This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered...
5 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Online Behavior
Cybersecurity tips. Part 2: Online behavior.
This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security
Cybersecurity tips. Part 1: Awareness.
When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line...
4 minute read
Protecting your smartphone from fake cell towers.
The first time I heard about “Fake Cell Towers”, I thought to myself, Hold up. There is such a...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Mobile Tracking,
Data Privacy Day,
CFMA
Data Privacy Day 2018: How safe is your personal information?
Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any...
3 minute read
CES 2018: Voice assistants and data collection.
CES, that mind-boggling and exhausting annual tribute to tech innovations has changed. More than 25...
1 minute read
Prevent apps from spying on your phone.
How many of us have shared secrets, disciplined our children, sought council on how to address a...
3 minute read
The cybersecurity threats of corporate espionage.
Just a week into the new year and Gartner’s prediction that information security spending will...
3 minute read
New Year resolutions for mobile security.
A Personal Perspective on Security Resolutions for 2018 It was our original intent to put together...
3 minute read
Mobile Surveillance,
Smartphone Vulnerabilities,
Mobile Tracking,
Mobile Espionage,
Data in Vicinity
Prevent Facebook & Google from listening to your phone.
You either know somebody or it has happened to you – you have a conversation around your...
6 minute read
Time to hide your shopping history!
My Strategy for Defending Christmas against the Internet Titans.
1 minute read
Privoro celebrates Human Rights Day with privacy.
This Sunday, December 10th, 2017 marks the 69th anniversary of the United Nation's Human Rights Day...
2 minute read
11 best practices for computer and smartphone security.
Computer Security Day. At last a social media holiday that offers an opportunity to take stock of...
2 minute read
4 things to learn from the smartphone security breaches in Mexico.
First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.
3 minute read
Security tips for international travel.
Preparing for a business trip – international or domestic – used to be a fairly routine ritual. Not...
4 minute read
U.S. Government officials plea for smartphone security. Is it enough?
You can now add Sen. Ron Wyden (D-Ore) to the growing list of government officials and entities...
1 minute read
One notification you’ll never see: “Your smartphone has been hacked.”
Recent news reports, covering two separate incidents, confirm a conclusion we continue to draw...
2 minute read
"The headlines about smartphone hacks don’t pertain to me."
The topic of smartphone hacking isn’t likely to make it into Monday morning watercooler...
1 minute read
Data in vicinity: Data collected in the presence of an electronic device.
In today’s digital-driven world, just about everything we do creates a data trail that can live...
2 minute read
Mobile phone tracking: "I've got nothing to hide."
We hear this when we discuss the breaches to smartphones with people who are often not government...
2 minute read
Why did we start Privoro? Setting a new standard for mobile security.
Because we believe that people, businesses and governments should be able to trust and control...
2 minute read