<img alt="" src="https://secure.vane3alga.com/162136.png" style="display:none;">
BlogHeaderFinal.jpg

Cybersecurity Tips. Part 2: Online Behavior

Posted by Matt Shaheen on Mar 21, 2018 8:30:00 AM

This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered general awareness and protection of personal devices. In this post, I will focus on online interactions and provide advice to help ensure you are safe, secure and private in the online world.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security, Online Behavior

Cybersecurity Tips. Part 1: Awareness

Posted by Matt Shaheen on Mar 5, 2018 6:30:00 AM

When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line dial-up modem and a beeper. For years, the computer was the only device I connected to the corporate network. The computer was provisioned to me complete with corporate standard software and all of the necessary security controls built in. The software was kept up to date by my IT department and the only things I had to do were keep the device physically safe from thieves and avoid losing it. Fast forward to today and things look much different. With the emergence of BYOD (Bring Your Own Device), more personal machines are connecting to the private networks of organizations without the oversight of IT. The presence of these devices increase the risk of exploitation from the outside. Chief Information Security Officers (CISOs), who are responsible for securing enterprise networks, face challenges with this new paradigm. The days of relying on the IT department to handle everyone’s cybersecurity needs are gone. It has become imperative for all of us to take a more active role in maintaining the right cybersecurity measures for ourselves. By paying attention and doing work to set things up properly, you can keep yourself and your livelihood safe. After all, like a chain with several links, your corporate security is only as strong as its weakest link. Do you want to be the weak link?   

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security

Protecting Your Smartphone from Fake Cell Towers

Posted by Blake Kotiza on Feb 5, 2018 10:17:28 AM

The first time I heard about “Fake Cell Towers”, I thought to myself, Hold up. There is such a thing as a “fake” cell tower?!? Why would someone want or use a fake cell tower?

Read More

Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security, fake cell towers

Data Privacy Day 2018: How Safe is Your Personal Information?

Posted by Nik Souris on Jan 26, 2018 8:00:00 AM

Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any data that could potentially identify a specific individual. Additionally, it may include any information that can de-anonymize a person from other persons or a set of anonymous data.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, CFMA

Prevent Apps from Spying on Your Phone

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy, Data in Vicinity

Prevent Facebook & Google from Listening to Your Phone

Posted by Blake Kotiza on Dec 18, 2017 10:00:00 AM

You either know somebody or it has happened to you – you have a conversation around your smartphone, check your social media or news feed, and boom, the topics of your conversation are being advertised on your smartphone. Most people’s reaction is usually some combination of “WTF?!?” and “Is my phone really listening in on me?” This isn’t new news, but mobile espionage (the modern catch phrase for smartphones listening, watching and tracking your every movement without you knowing) is certainly getting discussed a lot more, and on many levels.

Read More

Topics: Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage, Data in Vicinity

4 Things to Learn from The Smartphone Security Breaches in Mexico

Posted by Matt Shaheen on Nov 15, 2017 10:55:22 AM

First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Mobile Espionage

U.S. Government Officials Plea for Smartphone Security. Is it Enough?

Posted by Blake Kotiza on Nov 1, 2017 4:07:51 PM

You can now add Sen. Ron Wyden (D-Ore) to the growing list of government officials and entities urging national security advisors to provide a higher level of security for government smartphones.

Read More

Topics: Smartphone Hacking, Smartphone Vulnerabilities, Government Security, Data in Vicinity, Government

One Notification You’ll Never See: “Your Smartphone Has Been Hacked.”

Posted by Blake Kotiza on Oct 24, 2017 7:00:00 AM

Recent news reports, covering two separate incidents, confirm a conclusion we continue to draw attention to when talking with security professionals, our customers and anyone concerned about their mobile security posture: Smartphones are inherently vulnerable, and little – to date – can be done to protect, detect, and remediate the compromises. Without full view into the ecosystem of the phone, software solutions alone will never be enough to safeguard the important information of users and protect their privacy.

Read More

Topics: Smartphone Hacking, Smartphone Vulnerabilities

"The Headlines About Smartphone Hacks Don’t Pertain to Me"

Posted by Nox R. Landa on Oct 19, 2017 7:00:00 AM

The topic of smartphone hacking isn’t likely to make it into Monday morning watercooler conversation. That is of course, unless you are a security professional and the very survival of your organization may hang on understanding it and protecting against it.

Read More

Topics: Smartphone Hacking, Smartphone Vulnerabilities, Data in Vicinity

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts