![]() ![]() So, even if you use an old, analog phone your calls may be tracked. Of course, phone companies also track phone calls as they need call information for their billing systems. It is common knowledge that the NSA has been tracking people’s calls, and even the changes proposed by President Obama won’t truly eliminate the spying. Such information is invaluable to burglars. Likewise, malware on computers or hackers operating on those machines could potentially intercept transmissions from security cameras attached to the same network as the devices (some cameras transmit data unencrypted), and copy such videos for their own systems. Miss Teen USA was allegedly blackmailed by a hacker who took control of her laptop’s webcam and photographed her naked when she thought the camera was not on. On that note, malware installed on your computer may take control of the machine’s webcam and record you – by taking photos or video – when you think the camera is off. Phones may even be capturing pictures or video of you when you do not realize and sending the photos or video to criminals! ![]() Some apps sync your contacts list to the providers’ servers by default, and others have been found to ignore privacy settings. Not only may your cellular provider be tracking information about you – such as with whom you communicate and your location – but it, as well as Google (in the case of Android), Apple (in the case of iPhones), or other providers of software on the device, may be aware of far more detailed actions such as what apps you install and run, when you run them, etc. Worse yet, since people often subscribe to Internet service from the same providers as they do television service, a single party may know a lot more about you then you might think. Even if the providers themselves declined to spy as such, it may be possible for some of their technical employees to do so. If it wanted to, or was asked by the government to do so, your ISP could easily compile a list of Internet sites with which you have communicated. Your Modem (and Internet Service Provider) Depending on service agreements, providers could potentially even sell this type of information to others, and, of course, they are likely to furnish this information to the government if so instructed. ![]() Providers of television programming can easily track what you are watching or recording, and can leverage that information to target advertisements more efficiently. ![]() You read that correctly – hackers successfully used a refrigerator to send out malicious emails. Furthermore, potential vulnerabilities have been reported in smart kitchen devices for quite some time, and less than a month ago a smart refrigerator was found to have been used by hackers in a malicious email attack. Information about when you wake up in the morning (as extrapolated from data on your Internet-connected coffee maker) and your shopping habits (as determined by information garnered from your smart fridge) can help robbers target your home. Many recent-generation kitchen appliances come equipped with connectivity that allows for great convenience, but this benefit comes at a price – potential spying and security risks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |