Get a Pentest and security assessment of your IT network.

Cyber Security

With Mobile Devices, Users Are the Product, Not the Buyer

A lot has been said about the Carrier IQ software, the way that it s used by carriers and whether it is capable of intercepting calls, texts and data on users handsets. But one lesson that has emerged from all of this is this: The mobile devices people buy and use for personal and sensitive taks every day simply do not belong to them. The carrier has the ability to control much of what the user does with his phone, whether it’s throttling data usage or dictating where they can get their apps from.

Source: https://threatpost.com/mobile-devices-users-are-product-not-buyer-120711/75970/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security