<img alt="" src="https://secure.vane3alga.com/162136.png" style="display:none;">
BlogHeaderFinal.jpg

Jacob Hughes

Recent Posts

Infographic: Smartphone Sensor Security

Posted by Jacob Hughes on Mar 7, 2019 10:06:17 AM

Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a first-of-its-kind mobile security solution companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities

Infographic: Smartphone Ban & Workplace Security

Posted by Jacob Hughes on Feb 26, 2019 10:44:01 AM

In our discussions with federal employees working under smartphone bans at the Pentagon and other high-value buildings, there’s a common theme that emerges: frustration.

Read More

Topics: Mobile Security, Government

How Smartphone Espionage Can Disrupt an Election

Posted by Jacob Hughes on Oct 31, 2018 4:50:29 AM

The mobile security of political candidates and their staff gets lost in the shuffle when discussing threats to our elections. However, a series of trends point to mobile espionage becoming the next major vehicle for electoral interference. These trends include:

  • The smartphone’s rising importance in conducting the day-to-day business of a political campaign
  • The increasing use of intrusive smartphone surveillance tools to target political officials
  • A growing appetite by malicious outsiders to interfere in elections by any means necessary

In this mobile security blog post, I’ll discuss the reasons why smartphones may be the next electoral hacking target and the potential consequences of such a shift.

Read More

Topics: Smartphone Vulnerabilities, Election Security, NSO Group, Pegasus Spyware, Government

Demystifying the Hardware Supply Chain for Smartphones

Posted by Jacob Hughes on Oct 23, 2018 7:38:39 PM

Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation about a topic that has long been a concern of security professionals: the hacking of the hardware supply chain. The fear of backdoors built into devices isn’t new (see: the blacklisting of Huawei and ZTE products by the US government), but concrete evidence is rarely made available to the public.

Read More

Topics: Smartphone Vulnerabilities, China, Supply Chain Attacks, Supermicro, Bloomberg Businessweek, Supply Chain Security, Supply Chain Risk

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts