BlogHeaderFinal.jpg

Think Your Phone is Safe in 2018? Think Again.

Posted by Julie DexterBerg on Sep 23, 2018 7:57:39 PM

We conducted our second annual survey on attitudes about smartphone privacy and security on August 1st, 2018. The results show a slightly elevated level of concern, but not as much as one might think given the endless stream of news reports about smartphone hacks and exploits. Check out the infographic of the results here.

Read More

Topics: Mobile Security, Mobile Surveillance

Global SOF Modern Warfare Conference Recap

Posted by Blake Kotiza on Sep 4, 2018 6:14:53 AM

Privoro recently attended the GSF Modern Warfare conference at Fort Bragg, home of the 82nd Airborne (I highly recommend researching the history of this division if you’re unfamiliar). Although our trip to Fort Bragg was a first, what wasn’t new at all is the problem smartphones are causing government employees across the military, intel agencies and Capitol Hill.

Read More

Topics: Smartphone Security, Cybersecurity, Data Privacy, Mobile Surveillance, Mobile Security

Smartphones Becoming Hackers' Favorite Target

Posted by Blake Kotiza on Aug 14, 2018 12:39:13 PM

Our world is filled with news and conversations about hacking. From well-publicized public hacks like Target, OPM and Equifax down to the private internal discussions of how to keep information safe, hacking is all around us.

Read More

Topics: Smartphone Security, Cybersecurity, Data Privacy, Mobile Surveillance, Mobile Security

Cybersecurity Tips. Part 3: Digital Hygiene

Posted by Matt Shaheen on Apr 5, 2018 9:36:33 AM

This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered general awareness and protection of personal devices. In part 2, I covered ways to protect yourself in online interactions. In this third and final post, I will focus on ways to practice good digital hygiene such as backing up data, managing passwords, keeping data clean and managing your social media information.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security, Cyber Hygiene

Cybersecurity Tips. Part 2: Online Behavior

Posted by Matt Shaheen on Mar 21, 2018 8:30:00 AM

This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered general awareness and protection of personal devices. In this post, I will focus on online interactions and provide advice to help ensure you are safe, secure and private in the online world.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security, Online Behavior

Cybersecurity Tips. Part 1: Awareness

Posted by Matt Shaheen on Mar 5, 2018 6:30:00 AM

When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line dial-up modem and a beeper. For years, the computer was the only device I connected to the corporate network. The computer was provisioned to me complete with corporate standard software and all of the necessary security controls built in. The software was kept up to date by my IT department and the only things I had to do were keep the device physically safe from thieves and avoid losing it. Fast forward to today and things look much different. With the emergence of BYOD (Bring Your Own Device), more personal machines are connecting to the private networks of organizations without the oversight of IT. The presence of these devices increase the risk of exploitation from the outside. Chief Information Security Officers (CISOs), who are responsible for keeping enterprise networks safe, face challenges with this new paradigm. The days of relying on the IT department to handle everyone’s cybersecurity needs are gone. It has become imperative for all of us to take a more active role in maintaining the right cybersecurity measures for ourselves. By paying attention and doing work to set things up properly, you can keep yourself and your livelihood safe. After all, like a chain with several links, your corporate security is only as strong as its weakest link. Do you want to be the weak link?   

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security

Data Privacy Day 2018 - Where is your Personally Identifiable Information (PII)

Posted by Nik Souris on Jan 26, 2018 8:00:00 AM

Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any data that could potentially identify a specific individual. Additionally, it may include any information that can de-anonymize a person from other persons or a set of anonymous data.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, CFMA

Who’s Listening to Your Conversation: Facebook? Google? Who else?

Posted by Blake Kotiza on Dec 18, 2017 10:00:00 AM

You either know somebody or it has happened to you – you have a conversation around your smartphone, check your social media or news feed, and boom, the topics of your conversation are being advertised on your smartphone. Most people’s reaction is usually some combination of “WTF?!?” and “Is my phone really listening in on me?” This isn’t new news, but mobile espionage (the modern catch phrase for smartphones listening, watching and tracking your every movement without you knowing) is certainly getting discussed a lot more, and on many levels.

Read More

Topics: Mobile Espionage, Mobile Surveillance, Mobile Tracking, Smartphone Vulnerabilities, Data in Vicinity

4 Things to Learn from The Smartphone Breaches in Mexico.

Posted by Matt Shaheen on Nov 15, 2017 10:55:22 AM

First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage

Mobile Tracking: "I've Got Nothing To Hide"

Posted by Nik Souris on Oct 2, 2017 9:00:00 AM

We hear this when we discuss the breaches to smartphones with people who are often not government intelligence or security professionals – users who are all too aware of these mobile security concerns. Breaches that are executed by competitors, governments and malicious actors of all types like those mobile surveillance attempts on a human rights activist being or a Mexican journalist. When we elaborate on how everyday apps over-reach their intended purpose to pry into the personal lives of users with mobile tracking to listen in on conversations or to track user location data; people say they have nothing to hide. To help shed some light on smartphone vulnerabilities, your phone privacy and what’s really at risk when your phone has been compromised, we set out to hack a smartphone and reveal the information that may be accessed through its sensors.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts