Security and Privacy Concerns for Mobile Devices

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too!  🙂

But there are some serious concerns about mobile devices. For example in March of this year, Sen. Charles Schumer talked with both Apple and Google over privacy concerns. It seems that some mobile apps were grabbing private photos and contact information and downloading them to servers or other sites – without the user’s permission…

It sends shivers up the spine to think that one’s personal photos, address book, and who knows what else can be obtained and even posted online without consent,” Senator Schumer wrote in a letter to the FTC.

Listing the permissions that an App wants during install is helpful. For example, on an Android device you are shown what the app wants access to – network access, phone access – but does everyone take the time to read them before they install the latest “gotta have” app? And even though apps are checked before being placed on Apple’s Marketplace, one common tactic that malicious programmers have used is to download malware with app updates.

And it is not just private data concerns that have been raising alarms. What about the video and recording features of smart devices or even the upcoming “Google Glasses”? Sure these are great in emergency situations, but what about at private meetings, secured facilities or around classified information?

An article in June from NY Times mentions some of the techniques that could be used to block smart phone recording features. SpyFinder camera detectors, Google algorithms for un-tagging people in photos, personal infrared and white noise generators are all mentioned.

Smart devices are excellent to use and a great convenience. But do you want them sharing your private contact information or personal photos? Do you really want recording devices and a possible additional malware platform inside your facility?

These are some of the security and privacy concerns that must be considered for both the individual user and the corporate environment.

7 thoughts on “Security and Privacy Concerns for Mobile Devices”

  1. Hey Bud! Hope all is well with you and yours. I recently pciked up a Droid X2 and want to break in and dig around in it. What would you suggest and where would I get info on what’s what once I’m in?

    ~Philo

    1. Hi Philo!

      Haven’t played with the Droid X2 yet. Not sure if you wanted to root it, I am always hesitant about that.

      If I remember correctly, if you install the Android SDK, and the USB driver for it, you can hook your PC up to it and see all of the files structure on the phone. Then just poke around.

      It’s kinda neat, a lot of the files are recognizable but with odd extensions. For example, if you find the music files, you can rename them and listen to music files, same with the graphics.

      Also, you will see the crazy amount of data that some of the Apps store. For example, one of the online Radio programs stores a ton of data, which I manually deleted, hehehe…

Leave a reply to Security and Privacy Concerns for Mobile Devices « CYBER ARMS ... | High Technology Threat Brief (HTTB) | Scoop.it Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.