information security

Is My Smartphone Listening to Me?

blob

written by: A. Smith
July 25, 2019


If you have an Android device, it is a very capable possibility. The idea in which it is implemented is utilizing a method known formally as Spearphishing. (No, unfortunately, it is not a term referring to the extreme pastime of underwater fishing.)

Spearphishing has a more sinister definition in the tech industry.. If you are unfamiliar with the term or practice, I would highly recommend a quick online search to expand your tech vocabulary. A sixteen-page analysis of findings released on July 12, 2019, by a team of expert researchers from the University of Alabama and Rutgers University, exposed a very real security threat. Through their research and testing, they developed a new 3-pronged attack on the Android OS known as: Spearphone *p2 L13.

The general take-away from reading this technically descriptive analysis simply boils down to understanding that the most mundane features on a phone, such as using voice commands for your search engine or utilizing speakerphone during an important business conversation. Those unassuming practices may expose your personal and confidential data to a cybercriminal or someone with malicious intent. Always be aware of every possibility and have a deep understanding of the importance of cybersecurity to your personal life and business. The question is not if, but when, and whether or not you a worthy target? Do you work for a company in which you retain sensitive work-related data on your phone?

Interesting parting thoughts to ponder.


 

 

 

 

 

 

 

 

*This article was solely written for the intent of educational purposes under the Fair Use act. *


6 Cyber Security Tips for the Average Joe

6 Cyber Security Tips for the Average Joe

Cyber security is complicated. Cyber security tips are not. To be an expert, it takes years of training and experience to ensure that all aspects of what can go wrong are accounted for and understood. But for the Average Joe, that amount of time and commitment is an unrealistic expectation. That’s why these six sexy, simple cyber security tips should be studied seriously by anyone who uses the internet (that’s you!).

Creating a Security Culture

Creating a Security Culture

An organization's culture highlights the beliefs and behaviors of employees and management. Recently, new trends of creating a security culture have grown in importance; one in which all individuals are alert for cyber threats, follow company policies and procedures and report all security incidents.