For most people, a compromised phone means a phishing link clicked, a malicious app downloaded, or an account accessed from an unfamiliar location. The remediation is straightforward: remove the offending app, change the passwords, run a scan. For…
For most people, a compromised phone means a phishing link clicked, a malicious app downloaded, or an account accessed from an unfamiliar location. The remediation is straightforward: remove the offending app, change the passwords, run a scan. For…
Mobile advertising IDs (ad IDs) were created to personalize the consumer experience. But today, these unique device identifiers are doing far more than helping brands sell sneakers—they’re quietly powering a multibillion-dollar surveillance economy…
As threats to our mobile devices and privacy become increasingly prevalent and sophisticated, protecting highly confidential communications is more important than ever. This blog post explores how Sotera SecurePhones, the most secure phones on the…
Updated April 2026. Originally published April 2025. When The Atlantic revealed in March 2025 that senior U.S. national security officials had coordinated military strike plans over a Signal group chat — accidentally including a journalist — the…
A perspective from Frank Purdy, Managing Partner at Phronesis Research LLC.
In recent times, the privacy and security of mobile devices has come under mounting pressure and threats from various quarters around the globe. These attacks on privacy have laid bare the vulnerabilities we face and the threats to our fundamental…
In an era where artificial intelligence (AI) is rapidly becoming ubiquitous in mobile technology, the recent challenges faced by Apple Intelligence’s Notification Summaries feature serve as a critical wake-up call for the industry. As we continue to…
The cybersecurity landscape is evolving rapidly, presenting both challenges and opportunities for businesses and technology professionals. As we look ahead, several key trends are emerging that warrant careful consideration and strategic planning.
Introduction In one of the most significant cyber-espionage campaigns to date, the Salt Typhoon hack has compromised the personal communications and critical data of top U.S. government officials.
Introduction to Mobile Phone Hacking It’s an undeniable fact that mobile devices have become an integral part of our lives. The widespread use of mobile phones, especially for business communications, has increased exponentially over the past…