![Help Net Security](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/03132846/helpnetsecurity-1600-400x200.jpg)
Privoro collaborates with Samsung to protect customers from spyware attacks
Privoro announced a new partnership with Samsung to provide a security capability for mobile devices. The new capability provides a critical shield against the invisible …
![location services](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102457/location_services-400x200.jpg)
The weaponizing of smartphone location data on the battlefield
For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal …
![airport security](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103802/airport-security-400x200.jpg)
Smartphone counterespionage for travelers
If you’re traveling abroad on business, there’s a good chance you’ll need to bring along a smartphone to get around, meet up with associates or learn about the idiosyncrasies …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094202/iphone2-400x200.jpg)
Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
Political campaigns adopt surveillance capitalism at their own peril
Since the middle of the 20th century, commercial advertising and marketing techniques have made their way into the sphere of political campaigns. The tactics associated with …
![smartphone hear](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093332/smartphone-hear-large-400x200.jpg)
Burner phones are an eavesdropping risk for international travelers
In recent years, burner phones have become an obligatory part of the international business traveler’s toolkit. But though these devices are designed to minimize the amount of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD