123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

It's A Matter Of Privacy

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Everyday people make compromises to their privacy and some of us do not have as much privacy as we really want. You may not be a celebrity, but the moment you woke up in the morning your privacy could be compromised. Why? It is because some Android Phones has GPS enabled on the phone; any of the widgets installed on it could possibly know your geo location.
A recent study from master's degree in information security experts have reviewed 30 regular phone widgets and half of them are gathering the user's geo location information and sending it to advertising servers. Seven of those send phone identifier info's – phone number and the SIM card's serial number to the developers.
Unlike the widgets of Android Phones,Foursquare application of other phones doesn't track the location of the person all the time. The person must update his location; personally checking in. However, this doesn't mean that another person cannot use the same system to check on other persons.
Even some cars could be used to track ...
... you down. For example the OnStar system of recent car models, which can track the cars geo location anytime and anywhere. It also gathers diagnostic information such as the speed of the vehicle. That information was shared to authorities, credit card companies and others. It may sound agreeable, but it could be used by others who have other plans in their mind.
As a person drives downtown, he or she could be monitored by traffic light cameras. Although, one could be photographed only when beating the red light; the idea of cameras monitoring you while driving isn't exactly heartwarming. In parking garage, there are cameras mounted above each ticket dispensers and from that distance and angle, the camera could capture clear images of the license plate as well as the face of the person.
When it comes to free internet access on establishments with wireless networks, a person could be at risk with wireshark or perhaps fireshark. Any person who has vile intent can use the wireshark to sniff any wireless packets and steal cookies or any other information. For example, if a person logs into his or her Facebook, they can steal the person's authentication cookies and use the person's Facebook account –impersonating the person.
Facial recognition technologies could be a heaven for stalkers.  For example, the Augmented ID system makes it possible for a person to capture a photo of someone using the phone. The application will then search its database for any matching face. This software will then identify the person and their social accounts using their pictures only.
A person doesn't need to become a master's degree information security expert just to understand the danger of credit card purchases to the privacy of an individual. In some purchases using credit cards, store clerks will ask for the person's zip code. Together with the credit card information and the name and address, anyone could easily use the information to target the person. There are others who shop at grocery stores using credit cards; when paying for the purchase, the person has to put their fingers on the fingerprint reader to register that data together with the credit card info on the stores database. Thus the store will have all the records regarding the purchase, name and address of the person aside from credit card details.
A person could be tracked using Facebook with the location services offered by the social network. If left by default, anyone could know where the person has been; where he or she is now or where he or she is going. This geo location is completely voluntary just like Foursquare. The person has control over it; he or she can define who can access and view the information. If a person will leave his or her viewable information public, then he or she is saying that I am willing to be followed or stalked all the time.
Some privacy concerns can be small while some can be larger; it is a matter of personal preference.The concern of every ms in information security expert is that most people are unknowingly making compromises on their own privacy. In fact, some are losing their prized privacy everyday.

EC-Council University is a licensed university that offers degrees and master's degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefitted from undergoing the programs in this university.
More information about master's degrees in information security available at www.eccuni.us

Total Views: 229Word Count: 831See All articles From Author

Add Comment

Computers Articles

1. Scraping Dan Murphys Liquor Products Details Data
Author: FoodDataScrape

2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk

3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape

4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape

5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape

6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical

7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape

8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape

9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha

10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape

11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack

12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape

13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape

14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape

15. Why Startups Should Invest In Custom Software Development Service
Author: Albert

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: