Privoro

Cybersecurity tips. Part 1: Awareness.

Posted by Matt Shaheen on Mar 5, 2018 6:30:00 AM

When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line dial-up modem and a beeper. For years, the computer was the only device I connected to the corporate network. The computer was provisioned to me complete with corporate standard software and all of the necessary security controls built in. The software was kept up to date by my IT department and the only things I had to do were keep the device physically safe from thieves and avoid losing it. Fast forward to today and things look much different. With the emergence of BYOD (Bring Your Own Device), more personal machines are connecting to the private networks of organizations without the oversight of IT. The presence of these devices increase the risk of exploitation from the outside. Chief Information Security Officers (CISOs), who are responsible for securing enterprise networks, face challenges with this new paradigm. The days of relying on the IT department to handle everyone’s cybersecurity needs are gone. It has become imperative for all of us to take a more active role in maintaining the right cybersecurity measures for ourselves. By paying attention and doing work to set things up properly, you can keep yourself and your livelihood safe. After all, like a chain with several links, your corporate security is only as strong as its weakest link. Do you want to be the weak link?   

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security

Data Privacy Day 2018: How safe is your personal information?

Posted by Nik Souris on Jan 26, 2018 8:00:00 AM

Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any data that could potentially identify a specific individual. Additionally, it may include any information that can de-anonymize a person from other persons or a set of anonymous data.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, CFMA

Prevent apps from spying on your phone.

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy, Data in Vicinity

New Year resolutions for mobile security.

Posted by Nox R. Landa on Dec 29, 2017 12:55:34 PM

A Personal Perspective on Security Resolutions for 2018

It was our original intent to put together a brief recap of the year in cyberattacks, breaches and exploits. But “brief” hardly seemed possible when we started digging in. Mexican journalist attacks, BlueBorn, KRACK, Broadcom WiFi chip bugs, WannaCry, Loapi, the Equifax hack and all the other DDoS, MITM, malware, ransomware, spearphishing and spoofing attacks made the list, but these are just starters.

Read More

Topics: Mobile Security, New Year Resolutions

11 best practices for computer and smartphone security.

Posted by Julie Dexter Berg on Nov 30, 2017 7:00:00 AM
Computer Security Day. At last a social media holiday that offers an opportunity to take stock of the technologies that enable everyone’s socialness to check your current computer security posture. And this includes your smartphone.
Read More

Topics: Mobile Security, Computer Security

4 things to learn from the smartphone security breaches in Mexico.

Posted by Matt Shaheen on Nov 15, 2017 10:55:22 AM

First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage

Security tips for international travel.

Posted by Julie Dexter Berg on Nov 3, 2017 1:22:01 PM

Preparing for a business trip – international or domestic – used to be a fairly routine ritual. Not anymore. Carrying those electronic essentials poses new threats to personal and enterprise security that savvy travelers must be aware of.

Read More

Topics: Mobile Security, Smartphone Hacking, Enterprise

Mobile phone tracking: "I've got nothing to hide."

Posted by Nik Souris on Oct 2, 2017 9:00:00 AM

We hear this when we discuss the breaches to smartphones with people who are often not government intelligence or security professionals – users who are all too aware of these mobile security concerns. Breaches that are executed by competitors, governments and malicious actors of all types like those mobile surveillance attempts on a human rights activist being or a Mexican journalist. When we elaborate on how everyday apps over-reach their intended purpose to pry into the personal lives of users with mobile tracking to listen in on conversations or to track user location data; people say they have nothing to hide. To help shed some light on smartphone vulnerabilities, your smartphone privacy and what’s really at risk when your phone has been compromised, we set out to hack a smartphone and reveal the information that may be accessed through its sensors.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking

Why did we start Privoro? Setting a new standard for mobile security.

Posted by Mike Fong on Sep 16, 2017 12:00:00 AM

Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.

Read More

Topics: Mobile Security, Privoro, Data in Vicinity

At Privoro, we’re rethinking mobile security to empower you to participate in our hyper-connected, data-driven world without giving up control of your personal information. Stay tuned to our blog to learn about the big problems we’re solving and why we’re using mobile security hardware systems to solve them.

Subscribe Here!

Recent Posts