On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled by a consortium of media organizations across the globe, capture the implications of this commercially available spyware.
Verizon recently released its annual Mobile Security Index, an always-anticipated snapshot of experiences and attitudes among senior professionals responsible for their organization’s mobile security. This year’s results crystallize what we at Privoro have known for some time: that mobile devices are as indispensable to modern business as they are challenging to protect. Let’s dig into the highlights.
In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington, D.C. two years earlier, shining light on the prevalence of these types of spying devices. Once used solely by law enforcement as a way of finding the international mobile subscriber identity (IMSI) linked to a criminal suspect’s SIM card for investigative purposes, now just about anyone can acquire or build an IMSI catcher to intercept a target’s communications. With such low barriers to entry, it’s no longer just the bad guys who need to be worried about these devices.
Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.
CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change in cellular connection status.
As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, establishing trust is a bit like the old chicken and egg dilemma: The company can’t earn trust without customer validation, yet they can’t get customers without first establishing trust. This is exactly why the hardest customer to land is always the first – and why, at the end of the day, successfully navigating the delicate balance of trust becomes vital to survival.
So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to say that awareness of this issue has reached the mainstream, increasingly forcing individuals, enterprises and product makers to change how they operate. To see how the trajectory of smartphone surveillance has changed even in the last several months, I think it would be helpful to look back at my 2019 predictions as a starting point.
In August, we conducted our annual survey designed to gauge attitudes about mobile security and privacy. In looking behind this year’s numbers, I was struck by how shifting perspectives seem to mirror the goings-on in the world of Apple. As a trillion-dollar company and the maker of the ever-popular iPhone, Apple has a metaphorical magnifying glass on everything it does, good or bad.
Think of the last time you received a sensitive piece of information. Perhaps it was news of a highly anticipated project at work finally getting the green light, or maybe a not-for-public-consumption update about a friend’s pregnancy. Now recall what you did with that information. Did you keep it to yourself or did you share it with a significant other or trusted friend?