New Year resolutions for mobile security.

Posted by Nox R. Landa on Dec 29, 2017 12:55:34 PM

A Personal Perspective on Security Resolutions for 2018

It was our original intent to put together a brief recap of the year in cyberattacks, breaches and exploits. But “brief” hardly seemed possible when we started digging in. Mexican journalist attacks, BlueBorn, KRACK, Broadcom WiFi chip bugs, WannaCry, Loapi, the Equifax hack and all the other DDoS, MITM, malware, ransomware, spearphishing and spoofing attacks made the list, but these are just starters.

Read More

Topics: Mobile Security, New Year Resolutions

11 best practices for computer and smartphone security.

Posted by Julie Dexter Berg on Nov 30, 2017 7:00:00 AM
Computer Security Day. At last a social media holiday that offers an opportunity to take stock of the technologies that enable everyone’s socialness to check your current computer security posture. And this includes your smartphone.
Read More

Topics: Mobile Security, Computer Security

4 things to learn from the smartphone security breaches in Mexico.

Posted by Matt Shaheen on Nov 15, 2017 10:55:22 AM

First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage

Security tips for international travel.

Posted by Julie Dexter Berg on Nov 3, 2017 1:22:01 PM

Preparing for a business trip – international or domestic – used to be a fairly routine ritual. Not anymore. Carrying those electronic essentials poses new threats to personal and enterprise security that savvy travelers must be aware of.

Read More

Topics: Mobile Security, Smartphone Hacking, Enterprise

Mobile phone tracking: "I've got nothing to hide."

Posted by Nik Souris on Oct 2, 2017 9:00:00 AM

We hear this when we discuss the breaches to smartphones with people who are often not government intelligence or security professionals – users who are all too aware of these mobile security concerns. Breaches that are executed by competitors, governments and malicious actors of all types like those mobile surveillance attempts on a human rights activist being or a Mexican journalist. When we elaborate on how everyday apps over-reach their intended purpose to pry into the personal lives of users with mobile tracking to listen in on conversations or to track user location data; people say they have nothing to hide. To help shed some light on smartphone vulnerabilities, your smartphone privacy and what’s really at risk when your phone has been compromised, we set out to hack a smartphone and reveal the information that may be accessed through its sensors.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking

Why did we start Privoro? Setting a new standard for mobile security.

Posted by Mike Fong on Sep 16, 2017 12:00:00 AM

Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.

Read More

Topics: Mobile Security, Privoro, Data in Vicinity

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts