Search the Community
Showing results for tags 'cell phones'.
Found 2 results
LSW posted a topic in CybersecurityGoogle Collects Android Location Data Even When Location Service Is Disabled https://thehackernews.com/2017/11/android-location-tracking.html I am highlighting this article on the grounds that is raises a few points and if you use the iPhone you should not ignore it. This is an issue with every mobile device, not just Android. It is how phones work and why they use triangulation in police shows on TV. That is how the system works. Your device connects to the nearest and most powerful tower in the area. As you move from Grid A, the signal gets weaker and the device searches for the next closest tower, that may be Grid B. So you can be easily tracked by looking at what towers your phone connects to and a path will then show, it will show where you are or where you spend time etc. Law Enforcement uses this technique all the time. This particular article is about Google collecting that data (which they claim they are ending by the end of the year). This more about them collecting the data and what they do with it. Remember that Google is a for profit organization. Services is how they make their profit and they consider selling your data as part of that service to their advertisers. That is why a lot of the advertisements you see are what your interested in. Google Chrome is also the most popular browser and makes your life so easy signing on to things because they are collecting your data or data on you and selling it. You are not their customers, your are their commodity and advertisers etc. are their customers. So if you use iPhone, OnePlus, Android or Windows phones... You can be and will be tracked, that if how your phone works, so don't think this is "Just an Android issue". As an Android user, I cringe at this article, but I accept that that is the way it is and is no different than when I used an early iPhone. One last question: What does your service provider do with that data? AT&T, Verizon, T-Mobile and co. It is there towers you are connecting to, do you know what they do with that data from those towers?
Here I will be listing videos I come across on the subject of securit. There is now way to denote new one so you need to just keep coming back, I will add the dates as of all new ones: CIS / MS-ISAC (Center for Internet Security & Multi-State Information Sharing and Analysis Center) Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [in]security (58 min.) - You will be surprised and I hope disturbed by what all your "Devices" (some of those being devices you did not even know about) and what they are collecting about you and selling for their profit and you have no way to stop it anymore even if you know about it, and many times you will not! Assorted Media Blueborne - Android Take Over Demo (1:43) - This is a demo showing how in less than 2 min., using the BlueBorne attack, a pretend "Hacker" gets into a cell phone without the owners knowledge and activates the camera to watch her. The phone is an Android, put this attack is a Bluetooth vulnerability that affects ANY bluetooth device. It could also be your microphone or apps you use. does your phone sit where it can view your screen or your private activities? Does you Laptop sit open or is there a web cam on your PC and are these in your bedroom? Are sensitive files saved in a simple folder or are they at least in an encrypted container? [10/25/2017] Trape (10:33) - Trape is a so called people tracker. This video shows how to use it. Now this is a hacker tool, but I want you to understand how easy it is for you to be manipulated. I need but set this up and send you a link which you click and I have you. I can mess with you, I can get data about you. I can see all your social accounts id I want to stalk you. I just have to be creative and you have to be lazy just once. This tool creates the fake pages that look just like the originals. NOTE: The fake address for the victims is an IP address first, then the google address to fake you out. Remeber the top domain is always the first. [11/9/2017]