ALL >> Computers >> View Article
It's A Matter Of Privacy
Everyday people make compromises to their privacy and some of us do not have as much privacy as we really want. You may not be a celebrity, but the moment you woke up in the morning your privacy could be compromised. Why? It is because some Android Phones has GPS enabled on the phone; any of the widgets installed on it could possibly know your geo location.
A recent study from master's degree in information security experts have reviewed 30 regular phone widgets and half of them are gathering the user's geo location information and sending it to advertising servers. Seven of those send phone identifier info's – phone number and the SIM card's serial number to the developers.
Unlike the widgets of Android Phones,Foursquare application of other phones doesn't track the location of the person all the time. The person must update his location; personally checking in. However, this doesn't mean that another person cannot use the same system to check on other persons.
Even some cars could be used to track ...
... you down. For example the OnStar system of recent car models, which can track the cars geo location anytime and anywhere. It also gathers diagnostic information such as the speed of the vehicle. That information was shared to authorities, credit card companies and others. It may sound agreeable, but it could be used by others who have other plans in their mind.
As a person drives downtown, he or she could be monitored by traffic light cameras. Although, one could be photographed only when beating the red light; the idea of cameras monitoring you while driving isn't exactly heartwarming. In parking garage, there are cameras mounted above each ticket dispensers and from that distance and angle, the camera could capture clear images of the license plate as well as the face of the person.
When it comes to free internet access on establishments with wireless networks, a person could be at risk with wireshark or perhaps fireshark. Any person who has vile intent can use the wireshark to sniff any wireless packets and steal cookies or any other information. For example, if a person logs into his or her Facebook, they can steal the person's authentication cookies and use the person's Facebook account –impersonating the person.
Facial recognition technologies could be a heaven for stalkers. For example, the Augmented ID system makes it possible for a person to capture a photo of someone using the phone. The application will then search its database for any matching face. This software will then identify the person and their social accounts using their pictures only.
A person doesn't need to become a master's degree information security expert just to understand the danger of credit card purchases to the privacy of an individual. In some purchases using credit cards, store clerks will ask for the person's zip code. Together with the credit card information and the name and address, anyone could easily use the information to target the person. There are others who shop at grocery stores using credit cards; when paying for the purchase, the person has to put their fingers on the fingerprint reader to register that data together with the credit card info on the stores database. Thus the store will have all the records regarding the purchase, name and address of the person aside from credit card details.
A person could be tracked using Facebook with the location services offered by the social network. If left by default, anyone could know where the person has been; where he or she is now or where he or she is going. This geo location is completely voluntary just like Foursquare. The person has control over it; he or she can define who can access and view the information. If a person will leave his or her viewable information public, then he or she is saying that I am willing to be followed or stalked all the time.
Some privacy concerns can be small while some can be larger; it is a matter of personal preference.The concern of every ms in information security expert is that most people are unknowingly making compromises on their own privacy. In fact, some are losing their prized privacy everyday.
EC-Council University is a licensed university that offers degrees and master's degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefitted from undergoing the programs in this university.
More information about master's degrees in information security available at www.eccuni.us
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA