Protecting High-Level Personnel from IMSI Catchers

Posted by Mike Fong on Apr 8, 2021 3:46:00 PM

In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington, D.C. two years earlier, shining light on the prevalence of these types of spying devices. Once used solely by law enforcement as a way of finding the international mobile subscriber identity (IMSI) linked to a criminal suspect’s SIM card for investigative purposes, now just about anyone can acquire or build an IMSI catcher to intercept a target’s communications. With such low barriers to entry, it’s no longer just the bad guys who need to be worried about these devices.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, IMSI Catchers

Data Privacy Day

Posted by Jacob Hughes on Jan 28, 2021 1:13:18 PM

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, Surveillance capitalism

Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.

Posted by Blake Kotiza on Apr 16, 2018 12:00:00 PM

BlockingCamerasMicrophonesBlogImageOver the last couple of years I’ve become much more security- and privacy-focused. Why?

Read More

Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security

Protecting your smartphone from fake cell towers.

Posted by Blake Kotiza on Feb 5, 2018 10:17:28 AM

The first time I heard about “Fake Cell Towers”, I thought to myself, Hold up. There is such a thing as a “fake” cell tower?!? Why would someone want or use a fake cell tower?

Read More

Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security, fake cell towers

Data Privacy Day 2018: How safe is your personal information?

Posted by Nik Souris on Jan 26, 2018 8:00:00 AM

Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any data that could potentially identify a specific individual. Additionally, it may include any information that can de-anonymize a person from other persons or a set of anonymous data.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, CFMA

Prevent apps from spying on your phone.

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy, Data in Vicinity

Prevent Facebook & Google from listening to your phone.

Posted by Blake Kotiza on Dec 18, 2017 10:00:00 AM

You either know somebody or it has happened to you – you have a conversation around your smartphone, check your social media or news feed, and boom, the topics of your conversation are being advertised on your smartphone. Most people’s reaction is usually some combination of “WTF?!?” and “Is my phone really listening in on me?” This isn’t new news, but mobile espionage (the modern catch phrase for smartphones listening, watching and tracking your every movement without you knowing) is certainly getting discussed a lot more, and on many levels.

Read More

Topics: Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage, Data in Vicinity

4 things to learn from the smartphone security breaches in Mexico.

Posted by Matt Shaheen on Nov 15, 2017 10:55:22 AM

First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage

Mobile phone tracking: "I've got nothing to hide."

Posted by Nik Souris on Oct 2, 2017 9:00:00 AM

We hear this when we discuss the breaches to smartphones with people who are often not government intelligence or security professionals – users who are all too aware of these mobile security concerns. Breaches that are executed by competitors, governments and malicious actors of all types like those mobile surveillance attempts on a human rights activist being or a Mexican journalist. When we elaborate on how everyday apps over-reach their intended purpose to pry into the personal lives of users with mobile tracking to listen in on conversations or to track user location data; people say they have nothing to hide. To help shed some light on smartphone vulnerabilities, your smartphone privacy and what’s really at risk when your phone has been compromised, we set out to hack a smartphone and reveal the information that may be accessed through its sensors.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts