culture

Is My Smartphone Listening to Me?

blob

written by: A. Smith
July 25, 2019


If you have an Android device, it is a very capable possibility. The idea in which it is implemented is utilizing a method known formally as Spearphishing. (No, unfortunately, it is not a term referring to the extreme pastime of underwater fishing.)

Spearphishing has a more sinister definition in the tech industry.. If you are unfamiliar with the term or practice, I would highly recommend a quick online search to expand your tech vocabulary. A sixteen-page analysis of findings released on July 12, 2019, by a team of expert researchers from the University of Alabama and Rutgers University, exposed a very real security threat. Through their research and testing, they developed a new 3-pronged attack on the Android OS known as: Spearphone *p2 L13.

The general take-away from reading this technically descriptive analysis simply boils down to understanding that the most mundane features on a phone, such as using voice commands for your search engine or utilizing speakerphone during an important business conversation. Those unassuming practices may expose your personal and confidential data to a cybercriminal or someone with malicious intent. Always be aware of every possibility and have a deep understanding of the importance of cybersecurity to your personal life and business. The question is not if, but when, and whether or not you a worthy target? Do you work for a company in which you retain sensitive work-related data on your phone?

Interesting parting thoughts to ponder.


 

 

 

 

 

 

 

 

*This article was solely written for the intent of educational purposes under the Fair Use act. *


Creating a Security Culture

Creating a Security Culture

An organization's culture highlights the beliefs and behaviors of employees and management. Recently, new trends of creating a security culture have grown in importance; one in which all individuals are alert for cyber threats, follow company policies and procedures and report all security incidents.