All eyes on mobile

Posted by Mike Fong on Mar 28, 2022 1:17:33 PM

Of all the data points contained in Zimperium’s recently released 2022 Global Mobile Threat Report, perhaps the most shocking is the spike in known cases of zero-day exploits being used in attacks against mobile devices. A zero-day exploit is one where the vendor is unaware of the corresponding vulnerability at the time of attack and has therefore not provided a workable patch. The number jumped to 17 from three the previous year, while the share of zero-days that were mobile-specific increased from 11% to 31%.

Read More

Topics: zero-day exploit, mobile threat

The powerful incentives for developing smartphone spyware

Posted by Jacob Hughes on Feb 11, 2022 4:33:27 PM

A recent investigation by Ronen Bergman and Mark Mazzetti in The New York Times Magazine opened the curtains into the complex, high-stakes world surrounding commercially available smartphone spyware. Zeroing in on NSO Group’s Pegasus product, the reporters detailed the powerful incentives at play in the proliferation of this spyware.

Read More

Topics: Mobile Espionage, spyware

Mike Fong featured on TWiET

Posted by Jacob Hughes on Dec 3, 2021 10:53:46 AM
Read More

Topics: Mobile Security, spyware, Trusted Hardware

Mind your smartphone location breadcrumbs

Posted by Mike Fong on Dec 1, 2021 2:23:44 PM

The location data we give up in using certain apps can be used by third parties to track our movements and infer our behaviors, preferences and beliefs. While this information may be relatively harmless when leveraged by a retailer or investor, there’s no telling who may ultimately gain access. In the hands of a malicious actor, such insights can facilitate physical tracking, blackmail, the outing of deeply held secrets and more.

Read More

Topics: Mobile Security, Smartphone Location Tracking

Traveling abroad on business? Assume that your smartphone will be compromised.

Posted by Michael Campbell on Oct 28, 2021 3:11:13 PM

When visiting certain high-risk countries on business, your smartphone activity may be monitored by local intelligence services. From fake cell towers to malicious carrier updates, spies in these countries have a number of ways to install malware on your device through your cellular connection alone. As such, it’s best to assume that your smartphone has been compromised when on foreign soil.

Read More

Topics: Mobile Security, Mobile Espionage, Travel, IMSI Catchers

The future of hardware isolation for mobile device security

Posted by Jacob Hughes on Oct 21, 2021 1:33:27 PM

SafeCase, our smartphone-coupled security device, serves as an ExoComputer: a secondary, special-purpose computing device to the smartphone. At first blush, the concept of an independent, security-focused system parallel to the mobile device may seem straight out of left field. But viewed in context, the ExoComputer represents an architectural evolution that builds upon the established concept of the trusted execution environment, isolating a smartphone’s critical security operations from attacks against the device’s user-facing environment.

Read More

Topics: Mobile Security, ExoComputer

Pegasus Project investigation uncovers the reach and implications of NSO Group spyware

Posted by Jacob Hughes on Jul 22, 2021 10:49:30 AM

On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled by a consortium of media organizations across the globe, capture the implications of this commercially available spyware.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Pegasus Spyware

Mobile security is serious business

Posted by Mike Fong on May 14, 2021 11:57:26 AM

Verizon recently released its annual Mobile Security Index, an always-anticipated snapshot of experiences and attitudes among senior professionals responsible for their organization’s mobile security. This year’s results crystallize what we at Privoro have known for some time: that mobile devices are as indispensable to modern business as they are challenging to protect. Let’s dig into the highlights.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities

Protecting High-Level Personnel from IMSI Catchers

Posted by Mike Fong on Apr 8, 2021 3:46:00 PM

In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington, D.C. two years earlier, shining light on the prevalence of these types of spying devices. Once used solely by law enforcement as a way of finding the international mobile subscriber identity (IMSI) linked to a criminal suspect’s SIM card for investigative purposes, now just about anyone can acquire or build an IMSI catcher to intercept a target’s communications. With such low barriers to entry, it’s no longer just the bad guys who need to be worried about these devices.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, IMSI Catchers

Data Privacy Day

Posted by Jacob Hughes on Jan 28, 2021 1:13:18 PM

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, Surveillance capitalism

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts