A spyware operator’s POV

A spyware operator’s POV

The PBS documentary series Frontline recently aired a two-part look at the Pegasus Project from the perspective of some of the journalists and targets involved. You can watch the episodes here ... Read More

Mike Fong on Chambers Talks

Privoro founder and CEO Mike Fong recently participated in a cybersecurity-focused discussion with fellow CEOs Vijay Balasubramaniyan (Pindrop) and Bipul Sinha (Rubrik), hosted by John Chambers of JC2 Ventures. You can listen to this episode of the Chambers Talks podcast through the link below ... Read More
Incentives

The powerful incentives for developing smartphone spyware

| | Mobile Espionage, spyware
A recent investigation by Ronen Bergman and Mark Mazzetti in The New York Times Magazine opened the curtains into the complex, high-stakes world surrounding commercially available smartphone spyware. Zeroing in on NSO Group’s Pegasus product, the reporters detailed the powerful incentives at play in the proliferation of this spyware ... Read More
EvolutionBlog

The future of hardware isolation for mobile devices

SafeCase, our smartphone-coupled security device, serves as an ExoComputer: a secondary, special-purpose computing device to the smartphone. At first blush, the concept of an independent, security-focused system parallel to the mobile device may seem straight out of left field. But viewed in context, the ExoComputer represents an architectural evolution that ... Read More
PegasusBlog copy

Pegasus Project investigation uncovers the reach and implications of NSO Group spyware

On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled ... Read More
DataPrivacyDayBlogImage

Data Privacy Day

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four ... Read More
Children, smartphones and the surveillance economy _Blog Image

Children, smartphones and the surveillance economy

For many children, smartphones are a gateway to greater independence and a more fulfilling social life. But smartphones can also open up a child’s life to the intrusive tracking, profiling and targeting that are table stakes for life in our digital world, potentially in ways that go beyond just advertising ... Read More
Smartphone_Sensors Blog

How Many Smartphone Sensors Can You Name?

Organizations concerned about sensor abuse are now adopting the Privoro SafeCase, a first-of-its-kind mobile security companion for smartphones that not only provides its own set of trusted sensors but also protects against illicit audio/video capture by hijacked cameras and microphones ... Read More
Work Productivity_Blog_Image

Nobody Likes a Smartphone Ban

| | government, Mobile Security
In our discussions with federal employees working under smartphone bans at the Pentagon and other high-value buildings, there’s a common theme that emerges: frustration ... Read More

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)