How the “two-man rule” elevates mobile security

How the “two-man rule” elevates mobile security

You may be familiar with the “two-man rule” from the movies. Used as a control mechanism for critical actions like launching a nuclear weapon, the two-man rule requires two authorized individuals to ...
A spyware operator’s POV

A spyware operator’s POV

The PBS documentary series Frontline recently aired a two-part look at the Pegasus Project from the perspective of some of the journalists and targets involved. You can watch the episodes here ...
Incentives

The powerful incentives for developing smartphone spyware

| | Mobile Espionage, spyware
A recent investigation by Ronen Bergman and Mark Mazzetti in The New York Times Magazine opened the curtains into the complex, high-stakes world surrounding commercially available smartphone spyware. Zeroing in on NSO ...
CounterespionageBlog-1

Traveling abroad on business? Assume that your smartphone will be compromised.

When visiting certain high-risk countries on business, your smartphone activity may be monitored by local intelligence services. From fake cell towers to malicious carrier updates, spies in these countries have a number ...
iphone-security

SafeCase and Beyond; Safeguarding Smartphone Data

Last month, we released our second-generation product, the Privoro SafeCase, which is compatible with the iPhone 7 and 8. While SafeCase can be used by organizations for a variety of use cases, ...