The Evolution of Smartphone Security

The Evolution of Smartphone Security

When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape changed...
Hardware Based Security For Government

Hardware Based Security For Government

The Importance of a Hardware Root of Trust for Smartphones In today’s connected world, smartphones have become an integral part of our daily lives, serving as personal assistants, communication devices, and gateways to the digital world. This is no different for...
A Secure Supply Chain and Your Privacy: Smartphone Components

A Secure Supply Chain and Your Privacy: Smartphone Components

Securing the Supply Chain A compromised component, whether it’s a backdoor in a chipset or a tainted software update, can unravel the entire security architecture of a device. It’s like a house with a gaping hole in the foundation. No amount of locks on the doors will...
The Tradeoffs of “Free” Smartphone Apps and Big IT’s User Data Mining

The Tradeoffs of “Free” Smartphone Apps and Big IT’s User Data Mining

Article courtesy of KoolSpan.com With the rise and near ubiquity of smartphones in today’s world, the need for secure communication has become even more pressing. Most encrypted messaging solutions in the market are targeted toward consumers and are free. However,...