Envisioning a mobile-powered government workforce

Envisioning a mobile-powered government workforce

ATARC’s Future of Secure Work Working Group, of which Privoro’s Heather McMahon is a member, recently published a white paper exploring what the future of secure mobility within the Federal government looks like. The working group envisions a dynamic and efficient workforce that seamlessly leverages mobile devices in a way ... Read More
The false security of the paper-centric office

The false security of the paper-centric office

| | secure mobility
In classified workspaces throughout the US government, printed paper still reigns supreme as a primary medium for information-sharing and collaboration. After all, “You can’t hack paper,” as the common refrain goes. And yet, numerous high-profile examples of classified documents being stolen or misplaced have shown the limits of this conventional ... Read More
How to make your phone effectively untraceable

How to make your phone effectively untraceable

The radios within a smartphone that facilitate tracking can’t be turned off with certainty, even when the device is powered down. To close this gap, we’ve partnered with Samsung on a unique integration providing strong assurance that such radios in the latest Galaxy phones are indeed turned off when specified ... Read More
A spyware operator’s POV

A spyware operator’s POV

The PBS documentary series Frontline recently aired a two-part look at the Pegasus Project from the perspective of some of the journalists and targets involved. You can watch the episodes here ... Read More

Mike Fong on Chambers Talks

Privoro founder and CEO Mike Fong recently participated in a cybersecurity-focused discussion with fellow CEOs Vijay Balasubramaniyan (Pindrop) and Bipul Sinha (Rubrik), hosted by John Chambers of JC2 Ventures. You can listen to this episode of the Chambers Talks podcast through the link below ... Read More
Incentives

The powerful incentives for developing smartphone spyware

| | Mobile Espionage, spyware
A recent investigation by Ronen Bergman and Mark Mazzetti in The New York Times Magazine opened the curtains into the complex, high-stakes world surrounding commercially available smartphone spyware. Zeroing in on NSO Group’s Pegasus product, the reporters detailed the powerful incentives at play in the proliferation of this spyware ... Read More
EvolutionBlog

The future of hardware isolation for mobile devices

SafeCase, our smartphone-coupled security device, serves as an ExoComputer: a secondary, special-purpose computing device to the smartphone. At first blush, the concept of an independent, security-focused system parallel to the mobile device may seem straight out of left field. But viewed in context, the ExoComputer represents an architectural evolution that ... Read More
PegasusBlog copy

Pegasus Project investigation uncovers the reach and implications of NSO Group spyware

On Sunday, the first reports were published under the banner of the Pegasus Project, revealing the results of an investigation into how NSO Group’s military-grade spyware has been used to hack the smartphones of business leaders, heads of state, activists, journalists, politicians and more. The findings of this investigation, compiled ... Read More
DataPrivacyDayBlogImage

Data Privacy Day

Today is Data Privacy Day, a perfect opportunity to learn how to keep your smartphone from being used for tracking purposes. While it can feel like a daunting challenge to escape the intrusive tracking practices employed by tech companies, advertisers and other players in the surveillance economy, use the four ... Read More

Secure Guardrails