Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.
For many children, smartphones are a gateway to greater independence and a more fulfilling social life. But smartphones can also open up a child’s life to the intrusive tracking, profiling and targeting that are table stakes for life in our digital world, potentially in ways that go beyond just advertising. Here, I’ll explore how smartphones are used by companies to legally surveil minors and what can be done to help children stay protected from the excesses of the surveillance economy.
Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a first-of-its-kind mobile security solution companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones.
In our discussions with federal employees working under smartphone bans at the Pentagon and other high-value buildings, there’s a common theme that emerges: frustration.
The mobile security of political candidates and their staff gets lost in the shuffle when discussing threats to our elections. However, a series of trends point to mobile espionage becoming the next major vehicle for electoral interference. These trends include:
- The smartphone’s rising importance in conducting the day-to-day business of a political campaign
- The increasing use of intrusive smartphone surveillance tools to target political officials
- A growing appetite by malicious outsiders to interfere in elections by any means necessary
In this mobile security blog post, I’ll discuss the reasons why smartphones may be the next electoral hacking target and the potential consequences of such a shift.
Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation about a topic that has long been a concern of security professionals: the hacking of the hardware supply chain. The fear of backdoors built into devices isn’t new (see: the blacklisting of Huawei and ZTE products by the US government), but concrete evidence is rarely made available to the public.