Privoro

A quick update on 2019 mobile predictions made in January.

Posted by Mike Fong on Oct 6, 2019 8:07:46 PM

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to say that awareness of this issue has reached the mainstream, increasingly forcing individuals, enterprises and product makers to change how they operate. To see how the trajectory of smartphone surveillance has changed even in the last several months, I think it would be helpful to look back at my 2019 predictions as a starting point.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, Smartphone Security, Corporate Espionage, spyware

How Apple shapes the narrative about smartphone security.

Posted by Julie Dexter Berg on Sep 18, 2019 10:49:09 AM

In August, we conducted our annual survey designed to gauge attitudes about mobile security and privacy. In looking behind this year’s numbers, I was struck by how shifting perspectives seem to mirror the goings-on in the world of Apple. As a trillion-dollar company and the maker of the ever-popular iPhone, Apple has a metaphorical magnifying glass on everything it does, good or bad.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, Smartphone Security

Infographic: Smartphone sensor security.

Posted by Jacob Hughes on Mar 7, 2019 10:06:17 AM

Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a first-of-its-kind mobile security solution companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities

The piece of hardware at the cutting edge of cybersecurity.

Posted by John Chambers on Mar 4, 2019 6:10:51 AM

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco

As a mentor, investor, and longtime player in the tech industry, I’m frequently asked which market segments I’m betting big on over the coming decade. My knack for spotting market transitions and the technologies that will fuel these shifts partially stems from my relentless focus on outcomes. That’s why I approach investing like a multiplayer chess game; I play out the entire game, replay various scenarios and anticipate others’ moves before I make the decision to invest my time and resources.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, JC2 Ventures, Connecting the Dots, John Chambers, Trusted Hardware

6 bold predictions for smartphone security in 2019.

Posted by Mike Fong on Jan 9, 2019 7:05:58 PM

In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on bigger real estate in the public consciousness, transforming from a largely abstract fear into a real, widespread and potentially devastating problem. The bad news is that this problem will get worse before it gets better. The good news is that security-centric organizations are looking for ways to proactively defend against this threat. So what will the next 12 months hold in store? Below, I’ve outlined six mobile security predictions for the coming year.

Read More

Topics: Mobile Security, Privoro, Smartphone Vulnerabilities, Smartphone Security, spyware, SafeCase, Data in Vicinity, Smartphone Anti-Surveillance

How smartphone espionage can disrupt an election.

Posted by Jacob Hughes on Oct 31, 2018 4:50:29 AM

The mobile security of political candidates and their staff gets lost in the shuffle when discussing threats to our elections. However, a series of trends point to mobile espionage becoming the next major vehicle for electoral interference. These trends include:

  • The smartphone’s rising importance in conducting the day-to-day business of a political campaign
  • The increasing use of intrusive smartphone surveillance tools to target political officials
  • A growing appetite by malicious outsiders to interfere in elections by any means necessary

In this mobile security blog post, I’ll discuss the reasons why smartphones may be the next electoral hacking target and the potential consequences of such a shift.

Read More

Topics: Smartphone Vulnerabilities, Election Security, NSO Group, Pegasus Spyware, Government

Demystifying the hardware supply chain for smartphones.

Posted by Jacob Hughes on Oct 23, 2018 7:38:39 PM

Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation about a topic that has long been a concern of security professionals: the hacking of the hardware supply chain. The fear of backdoors built into devices isn’t new (see: the blacklisting of Huawei and ZTE products by the US government), but concrete evidence is rarely made available to the public.

Read More

Topics: Smartphone Vulnerabilities, China, Supply Chain Attacks, Supermicro, Bloomberg Businessweek, Supply Chain Security, Supply Chain Risk

Why does the world need a SafeCase?

Posted by Mike Fong on Oct 10, 2018 4:46:23 AM

We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy need not be casualties of our hyper-connected, sensor-driven, mobile-first world. That we should be able to trust and control our electronic devices. That our information is ours alone, and we should be able to control how it is accessed and shared.

Read More

Topics: Mobile Security, Privoro, Smartphone Vulnerabilities, Data Privacy, Smartphone Security, spyware, SafeCase

Voice is the next interface, but what does that mean for mobile security?

Posted by John Chambers on Oct 2, 2018 7:04:30 PM

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco

Ten years ago, I would have said that voice was an interface of the past. Yet today, the voice revolution is well underway and it’s becoming clear that voice will, in fact, be the next major interface. Just look at the proliferation and capabilities of virtual assistants and voice-activated devices, whether it’s asking Amazon’s Alexa-enabled Echo to turn down the thermostat, having Google Home recite your schedule for the day, or instructing Apple’s Siri to read your emails out loud. While nearly one in five Americans has access to a smart speaker today, Gartner predicts that 75 percent of households in the U.S. will have smart speakers by 2020.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, Voice Security, IoT Security, JC2 Ventures, Connecting the Dots, John Chambers

Pentagon smartphone security policy.

Posted by Michael Campbell on Jul 16, 2018 7:05:00 AM

Pentagon’s smartphone policy costs taxpayers an estimated $2 million per day

On May 22, Pentagon leadership banned smartphones from all secure spaces – effectively every office and meeting room in the largest single office building in the world. The ban even includes government-issued phones given to high-priority personnel and negatively impacts over 26,000 Department of Defense military, civilian and contractor employees.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, SCIF Security, SCIF Spaces, Secure Spaces, Government

At Privoro, we’re rethinking mobile security to empower you to participate in our hyper-connected, data-driven world without giving up control of your personal information. Stay tuned to our blog to learn about the big problems we’re solving and why we’re using mobile security hardware systems to solve them.

Subscribe Here!

Recent Posts