BlogHeaderFinal.jpg

Why Does the World Need a SafeCase?

Posted by Mike Fong on Oct 10, 2018 4:46:23 AM

We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy need not be casualties of our hyper-connected, sensor-driven, mobile-first world. That we should be able to trust and control our electronic devices. That our information is ours alone, and we should be able to control how it is accessed and shared.

Read More

Topics: Mobile Security, Privoro, Smartphone Security, Smartphone Vulnerabilities, Data Privacy, spyware, SafeCase

Global SOF Modern Warfare Conference Recap

Posted by Blake Kotiza on Sep 4, 2018 6:14:53 AM

Privoro recently attended the GSF Modern Warfare conference at Fort Bragg, home of the 82nd Airborne (I highly recommend researching the history of this division if you’re unfamiliar). Although our trip to Fort Bragg was a first, what wasn’t new at all is the problem smartphones are causing government employees across the military, intel agencies and Capitol Hill.

Read More

Topics: Smartphone Security, Cybersecurity, Data Privacy, Mobile Surveillance, Mobile Security

Smartphones Becoming Hackers' Favorite Target

Posted by Blake Kotiza on Aug 14, 2018 12:39:13 PM

Our world is filled with news and conversations about hacking. From well-publicized public hacks like Target, OPM and Equifax down to the private internal discussions of how to keep information safe, hacking is all around us.

Read More

Topics: Smartphone Security, Cybersecurity, Data Privacy, Mobile Surveillance, Mobile Security

Why You’ll Pay for Privacy

Posted by Blake Kotiza on Jul 2, 2018 4:05:00 PM

Current State

Everything we do, everywhere we go, a data trail is following us, recording our actions, processing our data, and it’s going to intensify in the next several years presenting the question, will we have to pay for privacy? Yes, pay for privacy. Sounds ridiculous, and it is, but those that can afford privacy solutions will pay for it. Let me explain a little more.

Read More

Topics: Data Privacy, Virtual Assistants

Corporate Espionage Has Gone Mobile and Gotten Personal

Posted by Nik Souris on Jun 6, 2018 4:11:00 PM

Economic espionage – also known as industrial espionage, corporate espionage and corporate spying – justifiably resides as the top concern of security professionals and persists across companies of all sizes. Whether a company’s knowledge assets or data on its personnel, the odds have long been that someone seeks proprietary information.Today, however, the information is more accessible, exists in various locations and available to devices via the internet. What has also changed is the migration of access to data as it no longer occurs for everyone from a computer terminal in an office. Data now resides in the cloud and may possibly be distributed across a myriad of electronic devices. Moreover, the adoption of mobile computing combined with the explosion of electronic devices has forged a Bring Your Own Device (BYOB) work model that has essentially extended the enterprise’s security perimeter to each employee’s phone providing assailants a greater surface to attack with an easier entrée given the vulnerabilities with smartphones. These devices that have more computing power than what powered a business 40 years ago have but a fraction of the protections. The abilities to access corporate systems, intercept inter-company correspondence, eavesdrop on sensitive conversations, track employees and store precious data now reside on smartphones and reside in nearly every employee’s hand with the first and often only guard of protection to something an enterprise values.

Read More

Topics: Mobile Security, Cybersecurity, Corporate Espionage, Mobile Espionage, Smartphone Security, Data Privacy

When Apps Become Peeping Toms

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Data Privacy, Mobile Tracking, Smartphone Vulnerabilities, Data in Vicinity

Time to Defend Gift Mode!

Posted by Dan Hill on Dec 14, 2017 10:00:38 AM

My Strategy for Defending Christmas against the Internet Titans.

Read More

Topics: Data Privacy, Computer Security

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts