Some applications and functions can make easy targets for robberies and even kidnappings.
Call, take pictures, play music, send data, surf the web, locate friends, identify unknown songs, get tips for pairing wine and food, keeping track of your heartbeat while we exercise … The smartphone has exceeded any imaginable concept phone, the designs are attractive, the systems are easy to use, there are hundreds of applications available. There are so many practical advantages they give us, we rarely on your side less smart.
I’m no expert in technology, but when I think about the amount of personal information and that we work on a smartphone, I get to imagine what someone with bad intentions (company, person or institution) may do with it. Regardless of my paranoia, I think it important to show four of the major risks involved in using a smartphone as well as some recommendations for avoiding bad times.
Usually, pickpockets do not bother to extract information from the smartphone, simply sell the phone in the black market and they turn away. But in cities where there are more complex criminal networks, information from these devices adds value because it can be used to make telephone extortion.
Virtually all devices have password lock. Although cumbersome, it is better to use it.
Find out if the device has the option to remove data from your computer.
Get the IMEI code of the device. With that number can be left unusable when reporting the theft to the telephone company.
Do not forget to raise a complaint. May not recover the device, but protects you in case someone misused your information.
Avoid using your smartphone to do banking or consulting sites where you keep important information.
2. Theft via application
To be honest, few people bother to read all that fine print. And know that both individuals and companies doing business with our information. In the best case, incorporate our coordinates to a database that then sell to a market research agency. When its analysts have finished, turn sold to another company, and another and finally to another, which soon will contact us (and all the contacts of our calendar), to give us a cruise “totally free “except for a couple of services for which you have to give credit card number. Imagine the rest of the story.
Do not pay your phone and avoid leaving unattended, there are people that may download malicious applications from dubious sources.
3. Viewing without locks
Take for example the use of Foursquare. Foursquare is a microblog that allows people and services to locate on a map. For example, if you have the application on your phone and you will go to the most anticipated concert of the year, you check in from the system implementation and post your location: “Little Johnny is at the National Auditorium.” An average user of Foursquare links the check ins, and published in its facebook or twitter. Thus, all the “friends” know that is in concert Fulanito year or remain in the film the next two hours. It sounds as “cool” but if we do not lock at all, we become easy targets; publish the location is like telling a criminal gang, “Robert my house now that I’m not.”
I recommend this post hacking.mx portal. Here, besides showing other potential risks, there are seven security strategies that anyone can use, both to apliaciones Foursquare like.
4. Permanent Geolocation
The GPS smartphones that bring not only helps us find our way when we are lost, you can also show the location of other persons or the phone itself in case of theft or loss. For example, one can link to your friends and family through programs such as Latitude or Fire Eagle, and know where they are, if you got home or if you are stuck in traffic on Friday afternoon. This marvel of system loses its charm when you think what would happen if the phone falls into the hands of someone with bad intentions.
Activates the location of the device and installs the appropriate program. Each company (Android, Blackberry, iPhone, etc..) Has a different one. In case of theft, the tracking system can locate the device and, hopefully, also to the criminal who took it.
If you are staying in a place where not fear losing your smartphone or being assaulted, disable the location feature, that will return you to your life a little privacy.
In general …
Thanks to the smartphone via geolocation, Internet has become a great virtual eye can trace and memorize all of our routes, both physical and virtual. With sufficient malice, anyone can build a profile of behavior from what we seek in the network, pages visited, the people we connect with our physical appearance and location, the places we frequent, and applications for who exercise, you can tell even the rhythm of our heart. I do not know about you, but to me everything that makes me feel vulnerable.
The final warning: use a smartphone has many advantages but also carries risks. It is virtually impossible to hide or delete the tracks we leave when we are connected to the Internet. While there are no appropriate legislation and respectful smartphone user remains solely responsible for the information stored and shared.
What you see other risks in the use of smartphone? You propose a strategy to prevent it?