You Have Little Control With Smartphone App Privacy
People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.
People often go to great lengths on their PC to maintain some level of privacy but those options are rarely available on smartphones. What's worse is smartphone apps usually work best when connected, so tend to share more personal data than a PC app ever would.Users on a PC have access to firewalls, cookie blockers and rich browser settings that can aid them in remaining at least somewhat anonymous, though everyone should know once you connect your machine to the internet, you lose total anonymity immediately.
Smartphones, however, don't have those same tools. Even if they did, they wouldn't really help. For example, a firewall that blocked an app from phoning home would likely render the app useless as so many apps are dependant on online connections that connect to their home server. Think Facebook, Pandora, Twitter, 4Square and more.
The Wall Street Journal has analyzed 101 Android and iPhone apps and found that 56 of them transmitted the unique device ID of the phone back to various companies, including those that specialize in advertising. Pandora was one of the worst.
Testers found that Pandora sent information to eight different tracking companies. It sent the phone's location to seven of them, the device's ID to three of them and demographic data to two of them. Do you recall giving Pandora permission to do that? No? I didn't think so.
Even apps that shouldn't require much if any online access share information. Bejeweled 2 sends your user ID and password back to the application creator and the same info plus your phone number to third parties.
Don't count on Apple or Google to monitor this for you. Apple contends that apps cannot send user data without the user's express permission, but when confronted with these apparent violations, Apple clammed up. Google took the approach that if you don't want to let an app send data about you, just don't install the app.
For a detailed report on what the 56 apps disclose, see this page. Will that cause you to uninstall any of those apps, or not buy them in the first place?
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.