Jacob Hughes

Recent Posts

Pegasus Project investigation uncovers the reach and implications of NSO Group spyware

Posted by Jacob Hughes on Jul 22, 2021 10:49:30 AM

On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled by a consortium of media organizations across the globe, capture the implications of this commercially available spyware.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Pegasus Spyware

Data Privacy Day

Posted by Jacob Hughes on Jan 28, 2021 1:13:18 PM

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, Surveillance capitalism

Children, smartphones and the surveillance economy

Posted by Jacob Hughes on Oct 19, 2020 2:29:57 PM

For many children, smartphones are a gateway to greater independence and a more fulfilling social life. But smartphones can also open up a child’s life to the intrusive tracking, profiling and targeting that are table stakes for life in our digital world, potentially in ways that go beyond just advertising. Here, I’ll explore how smartphones are used by companies to legally surveil minors and what can be done to help children stay protected from the excesses of the surveillance economy.

Read More

Topics: Children and smartphones, Surveillance capitalism

Infographic: Smartphone sensor security.

Posted by Jacob Hughes on Mar 7, 2019 10:06:17 AM

Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a first-of-its-kind mobile security solution companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities

Infographic: Smartphone ban and workplace security.

Posted by Jacob Hughes on Feb 26, 2019 10:44:01 AM

In our discussions with federal employees working under smartphone bans at the Pentagon and other high-value buildings, there’s a common theme that emerges: frustration.

Read More

Topics: Mobile Security, Government

How smartphone espionage can disrupt an election.

Posted by Jacob Hughes on Oct 31, 2018 4:50:29 AM

The mobile security of political candidates and their staff gets lost in the shuffle when discussing threats to our elections. However, a series of trends point to mobile espionage becoming the next major vehicle for electoral interference. These trends include:

  • The smartphone’s rising importance in conducting the day-to-day business of a political campaign
  • The increasing use of intrusive smartphone surveillance tools to target political officials
  • A growing appetite by malicious outsiders to interfere in elections by any means necessary

In this mobile security blog post, I’ll discuss the reasons why smartphones may be the next electoral hacking target and the potential consequences of such a shift.

Read More

Topics: Smartphone Vulnerabilities, Election Security, NSO Group, Pegasus Spyware, Government

Demystifying the hardware supply chain for smartphones.

Posted by Jacob Hughes on Oct 23, 2018 7:38:39 PM

Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation about a topic that has long been a concern of security professionals: the hacking of the hardware supply chain. The fear of backdoors built into devices isn’t new (see: the blacklisting of Huawei and ZTE products by the US government), but concrete evidence is rarely made available to the public.

Read More

Topics: Smartphone Vulnerabilities, China, Supply Chain Attacks, Supermicro, Bloomberg Businessweek, Supply Chain Security, Supply Chain Risk

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts