Pegasus Project investigation uncovers the reach and implications of NSO Group spyware

Posted by Jacob Hughes on Jul 22, 2021 10:49:30 AM

On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled by a consortium of media organizations across the globe, capture the implications of this commercially available spyware.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Pegasus Spyware

Mobile security is serious business

Posted by Mike Fong on May 14, 2021 11:57:26 AM

Verizon recently released its annual Mobile Security Index, an always-anticipated snapshot of experiences and attitudes among senior professionals responsible for their organization’s mobile security. This year’s results crystallize what we at Privoro have known for some time: that mobile devices are as indispensable to modern business as they are challenging to protect. Let’s dig into the highlights.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities

Protecting High-Level Personnel from IMSI Catchers

Posted by Mike Fong on Apr 8, 2021 3:46:00 PM

In September 2019, attribution was given to Israel for the IMSI catchers discovered in Washington, D.C. two years earlier, shining light on the prevalence of these types of spying devices. Once used solely by law enforcement as a way of finding the international mobile subscriber identity (IMSI) linked to a criminal suspect’s SIM card for investigative purposes, now just about anyone can acquire or build an IMSI catcher to intercept a target’s communications. With such low barriers to entry, it’s no longer just the bad guys who need to be worried about these devices.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, IMSI Catchers

Data Privacy Day

Posted by Jacob Hughes on Jan 28, 2021 1:13:18 PM

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four tips below to start taking back control of your digital privacy.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, Surveillance capitalism

Lack of emphasis on secure teleworking is a national security risk.

Posted by Michael Campbell on Jun 1, 2020 4:12:16 PM
Commercial mobile devices without proper protections are creating risks to our National Security.
Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, spyware

The spies in our cell networks

Posted by Mike Fong on Mar 12, 2020 2:03:33 PM

CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change in cellular connection status.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, IMSI Catchers

A quick update on 2019 mobile predictions made in January.

Posted by Mike Fong on Oct 6, 2019 8:07:46 PM

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to say that awareness of this issue has reached the mainstream, increasingly forcing individuals, enterprises and product makers to change how they operate. To see how the trajectory of smartphone surveillance has changed even in the last several months, I think it would be helpful to look back at my 2019 predictions as a starting point.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, Smartphone Security, Corporate Espionage, spyware

How Apple shapes the narrative about smartphone security.

Posted by Julie Dexter Berg on Sep 18, 2019 10:49:09 AM

In August, we conducted our annual survey designed to gauge attitudes about mobile security and privacy. In looking behind this year’s numbers, I was struck by how shifting perspectives seem to mirror the goings-on in the world of Apple. As a trillion-dollar company and the maker of the ever-popular iPhone, Apple has a metaphorical magnifying glass on everything it does, good or bad.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, Smartphone Security

Infographic: Smartphone sensor security.

Posted by Jacob Hughes on Mar 7, 2019 10:06:17 AM

Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a first-of-its-kind mobile security solution companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones.

Read More

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities

The piece of hardware at the cutting edge of cybersecurity.

Posted by John Chambers on Mar 4, 2019 6:10:51 AM

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco

As a mentor, investor, and longtime player in the tech industry, I’m frequently asked which market segments I’m betting big on over the coming decade. My knack for spotting market transitions and the technologies that will fuel these shifts partially stems from my relentless focus on outcomes. That’s why I approach investing like a multiplayer chess game; I play out the entire game, replay various scenarios and anticipate others’ moves before I make the decision to invest my time and resources.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, JC2 Ventures, Connecting the Dots, John Chambers, Trusted Hardware

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts