Security and Privacy Concerns for Mobile Devices

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too!  :)

But there are some serious concerns about mobile devices. For example in March of this year, Sen. Charles Schumer talked with both Apple and Google over privacy concerns. It seems that some mobile apps were grabbing private photos and contact information and downloading them to servers or other sites – without the user’s permission…

It sends shivers up the spine to think that one’s personal photos, address book, and who knows what else can be obtained and even posted online without consent,” Senator Schumer wrote in a letter to the FTC.

Listing the permissions that an App wants during install is helpful. For example, on an Android device you are shown what the app wants access to – network access, phone access – but does everyone take the time to read them before they install the latest “gotta have” app? And even though apps are checked before being placed on Apple’s Marketplace, one common tactic that malicious programmers have used is to download malware with app updates.

And it is not just private data concerns that have been raising alarms. What about the video and recording features of smart devices or even the upcoming “Google Glasses”? Sure these are great in emergency situations, but what about at private meetings, secured facilities or around classified information?

An article in June from NY Times mentions some of the techniques that could be used to block smart phone recording features. SpyFinder camera detectors, Google algorithms for un-tagging people in photos, personal infrared and white noise generators are all mentioned.

Smart devices are excellent to use and a great convenience. But do you want them sharing your private contact information or personal photos? Do you really want recording devices and a possible additional malware platform inside your facility?

These are some of the security and privacy concerns that must be considered for both the individual user and the corporate environment.

About these ads

~ by D. Dieterle on August 13, 2012.

7 Responses to “Security and Privacy Concerns for Mobile Devices”

  1. [...] CYBER ARMS – Computer Security. Cyber War News and … inside your facility? These are some of the security and privacy concerns that must be considered for both the individual user and the corporate environment.  [...]

  2. [...] on cyberarms.wordpress.com Bookmark the [...]

  3. Reblogged this on lava kafle kathmandu nepal.

  4. [...] Do you really want recording devices and a possible additional malware platform inside your facility? These are some of the security and privacy concerns that must be considered for both the individual user and the corporate …  [...]

  5. Hey Bud! Hope all is well with you and yours. I recently pciked up a Droid X2 and want to break in and dig around in it. What would you suggest and where would I get info on what’s what once I’m in?

    ~Philo

    • Hi Philo!

      Haven’t played with the Droid X2 yet. Not sure if you wanted to root it, I am always hesitant about that.

      If I remember correctly, if you install the Android SDK, and the USB driver for it, you can hook your PC up to it and see all of the files structure on the phone. Then just poke around.

      It’s kinda neat, a lot of the files are recognizable but with odd extensions. For example, if you find the music files, you can rename them and listen to music files, same with the graphics.

      Also, you will see the crazy amount of data that some of the Apps store. For example, one of the online Radio programs stores a ton of data, which I manually deleted, hehehe…

  6. Sweet! I’ll check it out.

    Thanx Bud

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
Follow

Get every new post delivered to your Inbox.

Join 269 other followers

%d bloggers like this: