Everyday people make compromises to their privacy and some of us do not have as much privacy as we really want. You may not be a celebrity, but the moment you woke up in the morning your privacy could be compromised. Why? It is because some Android Phones have GPS enabled on the phone so any of the widgets installed on it could possibly know your geo location.
A recent study from master’s degree in information security experts have reviewed 30 regular phone widgets and half of them are gathering the user’s geo location information and sending it to advertising servers. Seven of those send phone identifier info’s – phone number and the SIM card’s serial number to the developers.
Unlike the widgets of Android Phones,Foursquare application of other phones doesn’t track the location of the person all the time. The person must update his location; personally checking in. However, this doesn’t mean that another person cannot use the same system to check on other persons.
Even some cars could be used to track you down. For example the OnStar system of recent car models, which can track the cars geo location anytime and anywhere. It also gathers diagnostic information such as the speed of the vehicle. That information was shared to authorities, credit card companies and others. It may sound agreeable, but it could be used by others who have other plans in their mind.
As a person drives downtown, he or she could be monitored by traffic light cameras. Although, one could be photographed only when beating the red light; the idea of cameras monitoring you while driving isn’t exactly heartwarming. In parking garage, there are cameras mounted above each ticket dispensers and from that distance and angle, the camera could capture clear images of the license plate as well as the face of the person.
When it comes to free internet access on establishments with wireless networks, a person could be at risk with wireshark or perhaps fireshark. Any person who has vile intent can use the wireshark to sniff any wireless packets and steal cookies or any other information. For example, if a person logs into his or her Facebook, they can steal the person’s authentication cookies and use the person’s Facebook account –impersonating the person.
Facial recognition technologies could be a heaven for stalkers. For example, the Augmented ID system makes it possible for a person to capture a photo of someone using the phone. The application will then search its database for any matching face. This software will then identify the person and their social accounts using their pictures only.
A person doesn’t need to become a master’s degree information security expert just to understand the danger of credit card purchases to the privacy of an individual. In some purchases using credit cards, store clerks will ask for the person’s zip code. Together with the credit card information and the name and address, anyone could easily use the information to target the person. There are others who shop at grocery stores using credit cards; when paying for the purchase, the person has to put their fingers on the fingerprint reader to register that data together with the credit card info on the stores database. Thus the store will have all the records regarding the purchase, name and address of the person aside from credit card details.
A person could be tracked using Facebook with the location services offered by the social network. If left by default, anyone could know where the person has been; where he or she is now or where he or she is going. This geo location is completely voluntary just like Foursquare. The person has control over it; he or she can define who can access and view the information. If a person will leave his or her viewable information public, then he or she is saying that I am willing to be followed or stalked all the time.
Some privacy concerns can be small while some can be larger; it is a matter of personal preference.The concern of every ms in information security expert is that most people are unknowingly making compromises on their own privacy. In fact, some are losing their prized privacy everyday.
EC-Council University is a licensed university that offers degrees and master’s degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefited from undergoing the programs in this university.
More information about master’s degrees in information security available at www.eccuni.us