Why smartphone - black hole for your personal data
Technologies / / December 19, 2019
In May 2018, Google announced a lot of cool chips in the new operating system Android P. Most of them are based on artificial intelligence, which through some 10 years, will oversee a good half of our lives. However, the program always has multiple security vulnerabilities, due to which a person may suffer. Already, hackers or security services can get full access to your personal life, using smart phone.
1. geolocation
This feature is available in all modern phones. With it happening map navigation and tracking routes while jogging. Law enforcement authorities may calculate the location of the offender with GPS. And applications such as the Foursquare, remember shops and cafes that you have visited.
If you want to hide your location from prying eyes by disabling the GPS, I have to disappoint you. Track the smartphone can be, and with other sensors, including accelerometer, magnetometer and a barometer.
It may seem that the leak of such information does not threaten. But criminals think differently. These data will help them create your profile, for example, for phishing attacks.
Michael Cobb (Michael Cobb), on IT-security expert and co-author of the book «IIS Security. Professional Directory "Photo locations give attackers clues about where and with whom you have been. Facebook and other social networks allow you to share the places that you visited. A malware is able to make the computer your friend to send this information to other people.
2. Malicious apps
You can install hundreds of various applications on the phone, which will significantly expand its functionality. However, some of the programs may collect about you more information than is necessary.
The worst thing is that the man himself gives you access to your data, or even asks: "Why this game need a camera and my contacts?". As in all other cases, the board will be:
Pay attention to what data the application requests access.
One might even suggest to use the programs only from official stores. But here we must be vigilant. For example, in 2017 on digital security experts from the company found RiskIQDo not Get Taken to School by These Malicious Mobile Apps in the Google Play Store 333 malicious applications from the category "Back to school".
3. Tracking over Wi-Fi
No matter how well he worked the mobile Internet, sometimes still have to use public Wi-Fi-points. We gladly accept all the conditions for connecting to the Internet, just to always be online. Especially because of this does not have to pay. And the owners points Wi-Fi use it.
Around the US clothing chain Nordstrom erupted in 2013 scandalHow Nordstrom Uses WiFi To Spy On Shoppers. It turned out that the owners used Euclid Analytics service to spy on customers connected to Wi-Fi. Using it you can track any movement inside the building. Later Nordstrom company had to abandon the use of this service.
This practice is common not only in the US but also in Europe and in Russia. For example, the company Watcom Group launched its own service surveillance of buyers in Moscow shopping centers. Of course, company executives say that these are only needed for the marketing department. Mark Zuckerberg was thinking exactly the same as the accounts of millions of Facebook users do not fall into the wrong hands. Leak no one is immune.
4. Shadowing through the chamber
Any camera, built-in phone or laptop can be used for sleuthing. It is enough to install special software. You can do this in two ways: physical access to the device or remotely. The last option the secret services and the National Security Agency.
To prevent unauthorized monitoring, author of "The Art of invisibility" and former hacker Kevin Mitnick (Kevin Mitnick) recommendsHackers and governments can see you through your phone's camera - here's how to protect yourself regularly updated to the latest version of the operating system. Nor should we forget a secure password.
5. Preparation of data through the microphone
When it comes to spying, many people say: "But who needs me, I have no secrets." This statement is completely wrong. For example, the company monitors AlphonsoHundreds of apps and games are monitoring smartphone users through their microphones over which transmission of smartphone users look, and then sends the data to the marketing departments of TV corporations. Now you feel the guinea pig?
6. Lack of security patches
At this point, iOS users can exhale. Apple has no difficulties with the support of their devices, which can not be said about the Android-smartphone.
Many manufacturers do not care about the safety of users and are confident that it is better to release a new device than to patch holes in the old.
If you come at least one security patch for all time use Honor 5X - count, you're lucky. Adrian Ludwig (Adrian Ludwig) and Mel Miller (Mel Miller) from Google's security team toldDiverse protections for a diverse ecosystem: Android Security 2016 Year in Review that more than half of the devices used at the end of 2016, did not receive security patches in 2017.
7. backdoors
Remember the scandal that broke out between Apple and the FBI, when the latter demanded the help of iPhone hacking into one of the terrorists. The guys from Cupertino said they could not do anything, because programmers have left a backdoor in the system.
Now imagine that the government, security services or anyone else can easily access all your data, diving into the "back door" OS.
In 2018 director of the six US agencies, including the FBI and the NSA, calledThe NSA and FBI do not see the irony of boycotting phones with built-in government backdoors refuse to buy ZTE and Huawei smartphone. They believe that the Chinese government has made it mandatory for manufacturers to build a backdoor into the firmware of devices. Is it true - is unknown, but there is much to ponder.
That's smart, our first assistant in matters may become a traitor who will tell all.
With the development of artificial intelligence security devices will increase. For example, the operating system will be able to track the threat itself and on the fly to adapt to the constantly changing hacking tools. But if hackers are still able to get control of your smartphone, the consequences are much more serious than it is now. Imagine what a pocket AIThat works against you.
see also
- 4 simple tips to protect your data in social networks →
- What is the theft of digital identity and how to protect your data in the Internet →
- How to improve the protection of personal data in the Android-smartphone →