Think of the last time you received a sensitive piece of information. Perhaps it was news of a highly anticipated project at work finally getting the green light, or maybe a not-for-public-consumption update about a friend’s pregnancy. Now recall what you did with that information. Did you keep it to yourself or did you share it with a significant other or trusted friend?
Topics: Mobile Security, Government Security, Data in Vicinity, Security Enterprise Services, Cyber Security News
In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on bigger real estate in the public consciousness, transforming from a largely abstract fear into a real, widespread and potentially devastating problem. The bad news is that this problem will get worse before it gets better. The good news is that security-centric organizations are looking for ways to proactively defend against this threat. So what will the next 12 months hold in store? Below, I’ve outlined six mobile security predictions for the coming year.
Topics: Mobile Security, Privoro, Smartphone Vulnerabilities, Smartphone Security, spyware, SafeCase, Data in Vicinity, Smartphone Anti-Surveillance
SafeCase and beyond; safeguarding smartphone data.
Last month, we released our second-generation product, the Privoro SafeCase, which is compatible with the iPhone 7 and 8. While SafeCase can be used by organizations for a variety of use cases, smartphone counter-surveillance protection is a core functionality. The case blocks the host smartphone’s cameras and actively masks each of the microphones with randomized noise. At Privoro, we believe that only physical, verifiable protections can overcome the threat of hijacked smartphone sensors targeting national security agencies, publicly traded companies and high-profile individuals.
Topics: Mobile Security, Mobile Espionage, SafeCase, Data in Vicinity, anti-surveillance
CES 2018: Voice assistants and data collection.
CES, that mind-boggling and exhausting annual tribute to tech innovations has changed. More than 25 years ago the event was dominated by the wireless players and Microsoft with a wink and a nod to Detroit. Over time the show has shifted from the pinnacle venue for tech companies to unveil their splashy new consumer products to the place to experience nascent technologies.
Topics: CES, Artificial Intelligence, Smartphone Security, Data in Vicinity
How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.
Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy, Data in Vicinity
Prevent Facebook & Google from listening to your phone.
You either know somebody or it has happened to you – you have a conversation around your smartphone, check your social media or news feed, and boom, the topics of your conversation are being advertised on your smartphone. Most people’s reaction is usually some combination of “WTF?!?” and “Is my phone really listening in on me?” This isn’t new news, but mobile espionage (the modern catch phrase for smartphones listening, watching and tracking your every movement without you knowing) is certainly getting discussed a lot more, and on many levels.
Topics: Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage, Data in Vicinity
U.S. Government officials plea for smartphone security. Is it enough?
You can now add Sen. Ron Wyden (D-Ore) to the growing list of government officials and entities urging national security advisors to provide a higher level of security for government smartphones.
Topics: Smartphone Hacking, Smartphone Vulnerabilities, Government Security, Data in Vicinity, Government
"The headlines about smartphone hacks don’t pertain to me."
The topic of smartphone hacking isn’t likely to make it into Monday morning watercooler conversation. That is of course, unless you are a security professional and the very survival of your organization may hang on understanding it and protecting against it.
Topics: Smartphone Hacking, Smartphone Vulnerabilities, Data in Vicinity
Data in vicinity: Data collected in the presence of an electronic device.
In today’s digital-driven world, just about everything we do creates a data trail that can live forever. Clicking on a website, opening the garage door, adjusting the temperature in our houses, taking a rideshare to the airport, making a dinner reservation, scanning our boarding passes, “liking” a photo, recording a television show, sending a text to a client, making a request into a digital assistant … all create an unwitting data trail. That data is stored, analyzed, brokered, distributed, parsed, combined and attributed to individuals, companies and nation states.
Topics: Privoro, Data in Vicinity
Why did we start Privoro? Setting a new standard for mobile security.
Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.
Topics: Mobile Security, Privoro, Data in Vicinity