Jump to content

Search the Community

Showing results for tags 'cell phones'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Job Boards
    • Jobs
  • Community Lounge and FAQ
    • Forum News
    • Open Forum
    • New Members Forum - Start Here!
  • Entrepreneurship, Business and Marketing
    • Social Media Marketing & Web Marketing
    • Entrepreneurship
    • Career Questions - Asked and Answered
  • StudioWeb
    • StudioWeb
    • StudioWeb News
    • StudioWeb Projects
  • Programming
    • Python
    • Javascript
    • PHP
  • Web Design
    • Beginners Web Design
    • HTML/XHTML
    • Dreamweaver
    • CSS
    • Advanced Web Design
    • Business of Web Design
    • Web Design News
  • Miscellaneous
    • Cybersecurity
    • Miscellaneous Software
    • Blogs and CMS
    • Web Accessibility
    • Peer-to-Peer Reviews
    • Website Templates
    • Web Design Jobs
    • Test Forum
  • Archives
    • Beginners Web Design
    • Course: The Complete Entrepreneur
    • Web Accessibility
    • Photoshop
    • CSS
    • Forum Rules and Etiquette
    • Flash
    • ASP
    • General Programming
    • Expression Web
    • Beginners Ruby
    • Killersites University
    • Actionscript

Categories

There are no results to display.

There are no results to display.

Product Groups

  • Business & Entrepreneur Courses

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website


LinkedIn


Facebook


Twitter


AIM


Yahoo


Other


Location


Interests

Found 3 results

  1. To begin with you should have a look at this article to understand what kind of data is being processed and that even if it does not use you name it can be traced to you. Once you understand the issue/threat, the follow up article used for the title will show you how to help protect yourself with the primary phone types. They do state that the article is based on the US, but do not make the mistake of thinking that whatever country you live in, you are safe.: Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html How to Stop Apps From Tracking Your Location https://www.nytimes.com/2018/12/10/technology/prevent-location-data-sharing.html
  2. Google Collects Android Location Data Even When Location Service Is Disabled https://thehackernews.com/2017/11/android-location-tracking.html I am highlighting this article on the grounds that is raises a few points and if you use the iPhone you should not ignore it. This is an issue with every mobile device, not just Android. It is how phones work and why they use triangulation in police shows on TV. That is how the system works. Your device connects to the nearest and most powerful tower in the area. As you move from Grid A, the signal gets weaker and the device searches for the next closest tower, that may be Grid B. So you can be easily tracked by looking at what towers your phone connects to and a path will then show, it will show where you are or where you spend time etc. Law Enforcement uses this technique all the time. This particular article is about Google collecting that data (which they claim they are ending by the end of the year). This more about them collecting the data and what they do with it. Remember that Google is a for profit organization. Services is how they make their profit and they consider selling your data as part of that service to their advertisers. That is why a lot of the advertisements you see are what your interested in. Google Chrome is also the most popular browser and makes your life so easy signing on to things because they are collecting your data or data on you and selling it. You are not their customers, your are their commodity and advertisers etc. are their customers. So if you use iPhone, OnePlus, Android or Windows phones... You can be and will be tracked, that if how your phone works, so don't think this is "Just an Android issue". As an Android user, I cringe at this article, but I accept that that is the way it is and is no different than when I used an early iPhone. One last question: What does your service provider do with that data? AT&T, Verizon, T-Mobile and co. It is there towers you are connecting to, do you know what they do with that data from those towers?
  3. Here I will be listing videos I come across on the subject of securit. There is now way to denote new one so you need to just keep coming back, I will add the dates as of all new ones: CIS / MS-ISAC (Center for Internet Security & Multi-State Information Sharing and Analysis Center) Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [in]security (58 min.) - You will be surprised and I hope disturbed by what all your "Devices" (some of those being devices you did not even know about) and what they are collecting about you and selling for their profit and you have no way to stop it anymore even if you know about it, and many times you will not! Assorted Media Blueborne - Android Take Over Demo (1:43) - This is a demo showing how in less than 2 min., using the BlueBorne attack, a pretend "Hacker" gets into a cell phone without the owners knowledge and activates the camera to watch her. The phone is an Android, put this attack is a Bluetooth vulnerability that affects ANY bluetooth device. It could also be your microphone or apps you use. does your phone sit where it can view your screen or your private activities? Does you Laptop sit open or is there a web cam on your PC and are these in your bedroom? Are sensitive files saved in a simple folder or are they at least in an encrypted container? [10/25/2017] Trape (10:33) - Trape is a so called people tracker. This video shows how to use it. Now this is a hacker tool, but I want you to understand how easy it is for you to be manipulated. I need but set this up and send you a link which you click and I have you. I can mess with you, I can get data about you. I can see all your social accounts id I want to stalk you. I just have to be creative and you have to be lazy just once. This tool creates the fake pages that look just like the originals. NOTE: The fake address for the victims is an IP address first, then the google address to fake you out. Remeber the top domain is always the first. [11/9/2017]
×
×
  • Create New...