<img alt="" src="https://secure.vane3alga.com/162136.png" style="display:none;">
BlogHeaderFinal.jpg

Thinking Like a Smartphone Eavesdropper

Posted by Mike Fong on Aug 6, 2019 8:46:59 AM

Security Magazine Article 2_Blog

Think of the last time you received a sensitive piece of information. Perhaps it was news of a highly anticipated project at work finally getting the green light, or maybe a not-for-public-consumption update about a friend’s pregnancy. Now recall what you did with that information. Did you keep it to yourself or did you share it with a significant other or trusted friend?

Given that it’s human nature to share and dissect closely held information with those we trust, it’s likely that you shared the details with at least one other person. This is the concept of concentric circles of trust at work.

I recently explored this concept as it applies to smartphone-based eavesdropping in an article for Security Magazine. Give it a read to learn more about why eavesdroppers cast a wide net in attempting to gather valuable bits of verbal information via hijacked smartphone microphones and how to best prioritize security resources in mitigating this threat.

READ THE ARTICLE

Topics: Mobile Security, Government Security, Data in Vicinity, Security Enterprise Services, Cyber Security News

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts