LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 17th, 2014
Linux Security Week: October 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Our growing security quagmire Print E-mail
User Rating:      How can I rate this item?
Source: Network World - Posted by Alex   
Latest News Information security was always an esoteric field but with personal computing came personal security issues, culminating in the identity theft problem that concerns even the most techno-phobic of consumers. It's about to get much worse. The latest interesting areas for security come from the proliferation of connected computing devices into new areas of our life: mobile devices (for example iPhone, Droid, iPad), building automation (smart-grid) and automotive computing. Up to now, we've worried about computers messing with our money. Now we can add to that the worry of computers tracking our location, killing our power and crashing our cars. As a security professional I am simultaneously appalled and hopeful for my job security.

The iPad and iPhone devices have really got people excited about handheld computing. But few people stop to think about the security implications. No other device is as intimately connected to a user as a smartphone. I often forget my wallet and my keys, but I rarely go anywhere without my smartphone. That makes my phone a fantastic tool for location based personal services, but also for ubiquitous and extremely intrusive surveillance.

The specs of the latest smartphones add up to a serious security problem: GPS, cellular data and location, magnetic compass, accelerometer, microphone and video camera. If you compromise a device that never leaves the side of the owner and contains those features, you have the most sophisticated surveillance system ever devised. It's far worse than compromising a PC or reading someone's e-mail. You could literally bug every conversation while knowing exactly where the user is and even if they are walking or lying down!

Read this full article at Network World

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
The Hacktivist as Angry Young Man
The Hacker Wars Hits NYC
CAINE Linux Distribution Helps Investigators With Forensic Analysis
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.