Smartphones and security

Do you know you're being spied on right now?

  • Why are they watching you

    All the big players on the market, including Google, operate on the same principle - their task is to help the user do something, go somewhere, buy some product or stop at a gas station. So in this context, the notion of "being watched" is very relative and has no conspiracy theories whatsoever.

  • The benefits of reading the user agreement

    The user agreement that you sign when you install the application spells out all the conditions. No one wants to read these small letters. But if you spend a little more time, you will find many answers, and they will be simple. In any case, it's up to you to choose what you open the door to for the app.

  • Man-in-the-middle

    The only more or less real risk is the so-called man-in-the-middle attack, when someone embeds himself between your device and a signal base station (Wi-Fi or GSM) if the channel is poorly encrypted. Then there's a chance that some data will leak within the session. But all popular apps are written by good developers and are well encrypted.

What information do the apps on our smartphones get about us?

What information do the apps on our smartphones get about us?

What does Google know about us? And most importantly, how can some dark forces dispose of all this data? Spoiler alert: practically nothing.

We tell Facebook what we're thinking, Instagram shows us what we're eating, Uber knows where we are, and Google will soon be analyzing our online purchases. Have we reached the precipice?

It's not that bad.

Questions about surveillance and monitoring are becoming more frequent and louder. The situation is escalated and booming, but the emphasis is completely misplaced. The CIA is not spying on you. But companies who want to sell you their goods or services are. Is this something to be afraid of? No.

That's because their only desire is to advertise effectively. There are very, very many mobile applications. How do you make money from them? There are two main options. The first is to sell apps for money. The second way to monetize is through advertising. When the app is running, a banner is shown - it's targeted advertising, that is, that which is relevant to that particular user. In order to understand what he is interested in, you need to collect some data - they are impersonal, there is no confidential information in them. It's useful for the advertiser to know where the user goes, near what he walks by, what model of smartphone he has, etc. But for whatever other purpose, there is nothing of value in such information. There are millions of smartphones: if one more is added to the database, nothing bad will happen to its owner.

  • Fact #1

    The attacks are so high-tech now that you can get infected just by accessing the Internet.

  • Fact #2

    Apple has centralized app storage, which is not easy to get into. In addition, the applications are moderated, so they are more or less protected. With Android, it is the opposite.

  • Fact #3

    It's always best to have the latest operating system and the latest updates for all installed applications.

Google's important Android security decision

For cheap devices, updates have never been released at all - only for flagship devices. Meanwhile, millions of people buy budget devices and walk around with them for years, until it becomes impossible to work with these devices at all. This threatens widespread mass attacks, which are easy to conduct by exploiting well-known vulnerabilities. At some point, Google realized that it was necessary to change the situation radically and come up with a scheme, under which the latest Android versions in important, critical system elements would be updated centrally, albeit partially, regardless of the device manufacturer. This is absolutely correct and will help protect against giant mass attacks in the long run.

Network and mobile security news

  • Short on Security: Android vs. iOS

    Because Apple brand smartphones are premium products, their quality, performance and security are strictly controlled by the brand. So the gadgets work almost flawlessly. Except, of course, for some nuances with a certain decline in device performance when the battery wears out, iPhones even several years after purchase can work as well as they did at the beginning of use. They are stable and reliable.

    Android smartphones, on the other hand, alas, cannot boast of this. At least not all. If we're talking about gadgets made by the world's leading brands, such as Samsung or Huawei, then we can expect stable operation without failures and freezes. But from the budget models of Chinese smartphones records of performance are not worth expecting. The reason for this "aging" of Android smartphones is that this operating system, despite all its sophistication, is not very well optimized, and each new installation of software or updates is not that crooked, but, let's say, not perfect. And although such errors are small and do not affect the operation of the device, but when they accumulate a certain amount, they gradually overload the phone and provoke the very same glitches and crashes.

    Older smartphones with earlier versions of the Android operating system are particularly prone to this "disease", while each new generation of gadgets is less and less prone to such an accumulation of failures and errors. And this clearly shows that the Android OS is constantly improving, which is cool.

    08/06/2022

    Call center headsets

    Call center headsets, as the name implies, are used in call centers and are used very intensively (many centers are open 24 hours a day). Such headsets are also called "professional" headsets. Accordingly, to such headsets have the following high requirements, namely:

    Sturdy construction

    The headset is designed to avoid rapid deterioration, all nodes must be protected as much as possible, namely, the connection point of the cable with the headset has a special "comb" that protects the cable from bending and subsequent fraying, the cable is protected from breaking by kevlar cord, reinforced mounting node boom microphone headset, headband must withstand bends.

    Adjusting pressure on the ear

    Since operators work long hours in call centers without removing the headset, it's important to be able to adjust the amount of pressure the headset cushions exert on the ear to avoid discomfort. To do this, the headband of the headset must flex, maintaining the flex and not causing the headband to break.

    Light weight

    Naturally, the lower it is, the less strain on your neck and spine, which is very important when using the headset extensively. Who needs to worry about spinal issues?

    Connectivity versatility

    For maximum connectivity, the headset is separated into two parts: the headset itself and the headset adapter. The headset and adapter are connected to each other with a QD connector. 

    08/06/2022

    Programs to synchronize your smartphone with your computer

    Mobile device manufacturers usually create a special program to synchronize their smartphones with your computer. For example, Apple has iTunes, and Nokia has Active Sync. The other companies also release programs with a lot of features and stable performance. But, what about versatility? To put for each smartphone its own program is not very convenient!

    On this developers of third-party applications, released their own universal programs. With their help, you can access calls, SMS, messengers, contacts and files smartphone. 

    This is especially true for college students, who can actively use their smartphones to gather information during the learning process. What is best lenovo for college students has already been well described in the article on https://whattdw.com.

    How to connect your phone to the laptop via USB

    The most popular way to synchronize devices is to connect using a USB cable, as all laptops and computers are equipped with the appropriate connectors. Most models use USB-A, but recently desktop manufacturers are starting to use USB-C. This is a new standard designed to create a barrier-free environment between all smart devices.

    Connecting your phone to your laptop for the first time requires an Internet connection. When you sync your devices, your computer automatically looks for the drivers needed to bring the two devices together.

    To avoid problems when connecting your phone to your laptop, you need to prepare for the process:

    1. Check that the USB connector works.
    2. Prepare a complete cable smartphone without defects.
    3. Find an adapter if the output of the supplied cable does not coincide with the laptop port.
    4. Connect the computer to the laptop.

    If all the points of the preparatory stage have been completed, there will be no problems with the connection of the phone to the PC. But it will be important to pay attention to the algorithm, which is different on Android and iOS devices.

    08/05/2022

    Can I trust a VPN?

    Not only you can, but you should. A VPN (Virtual Private Network) is a secure connection that allows you to secure your traffic, regardless of whether the carrier is GPS or Wi-Fi. If you suspect you're in an insecure place, it's better to protect your traffic with a VPN.

    08/04/2022

    How do I treat cookies?

    Everything should be treated with caution, especially if there is no security solution. If there is, in principle cookies can be trusted. But in general you have to be very careful: what is the address, where is the request coming from, how secure is the site. In most cases, when there is authorization of this type, encryption is used. And these files are only dangerous if there is a "malware" on the device, then it can do anything to you. But stealing through cookies is a primitive way, and it's rarely used. There are much more sophisticated situations, including when you are led to the desired site, shown the bank screen, you log in, make an alleged payment, your phone receives a confirmation sms, and at that moment the information is intercepted and goes to the attackers, and they "with your knowledge" make a completely different payment in a completely different direction.

    08/02/2022