Is your smartphone snooping on you?

Must Read

How to choose an effective DDoS mitigation plan

There are several flavours from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavours (always-on or on-demand)

How tech bolster security of online gaming platforms

The rise of and is evident throughout the world’s financial capitals with the UK, US, and a few other European nations at the forefront

Explained: The evolving nature of cybersecurity threats

Concerns such as hacking and the presence of computer viruses have existed for decades in one form or another. As technology evolved over the years, so did the cybersecurity  threats themselves.

While are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details among others can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your that access your private data by taking permissions through pop-ups or otherwise.

You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your ’s data puts your information at risk. The dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our . An innocent looking message could be all that is needed to compromise on your - accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you.  Here’s why:


One of the key features of a smartphone is its ability to locate itself (a surveillance technique) to cell towers, or the integrated GPS chip. Even if you disable the GPS on your phone, it can be tracked via other sensors. While disclosing location data may seem harmless, it can be used for a phishing attack. Worse still, imagine someone with your access to your location and is tracking your every move.  

Malicious apps

Third party Smartphone apps often ask for more information than is required. And we, sometimes unknowingly allow access when we agree to the app permissions. We need to be a little more cautious as to why these third party apps needs access to one’s personal data’s like  contacts, GPS, gallery access and camera. Users should be more aware about the apps they install and ensure that they download apps from reputable sources only.

Your camera could be watching you 

It’s absolutely possible to look at a person through the camera on your phone. Smartphone cameras are also a security risk, as they can be activated and used to spy on the owner.  Kevin Mitnick the American computer security consultant, author and hacker claims smartphones cameras can be used to spy on its users either installing software on the phone via physical access, or via a remote exploitation.

Your Flashlight application could be a hidden privacy threat

For many, the flashlight application can be a lifesaver and tops the 10 most important applications one can have on one’s smartphone. But a simple flashlight application turns out to be sourcing a shocking amount of user data when you download it, tapping everything from your calendar to your phone’s location engine to your camera. In America, FTC (Federal Trade Commission) went after the makers of “Brightest Flashlight” last year for deceiving users about how it shared geolocation information with advertising networks. But all these can be tracked, thanks to the privacy controls on today’s smartphones like the BlackBerry and iPhone, but the truth is that most people don’t.

The Good News

The most positive news in all of this is that companies are understanding the seriousness of this issue and are addressing it, by introducing devices that are high in security.

The write is Executive Director, . Views are personal.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Leave a Reply

*The moderation of comments is automated and not cleared manually by Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Sapience Analytics signs distribution agreement with Redington

Sapience Analytics and Redington said that they have entered into a distribution agreement where latter will resell the Sapience Vue solution through its network of over 30,000 channel partners, system integrators, and value-added resellers countrywide.
- Advertisement -SAP Hana

Related Articles