Wednesday 19 September 2012

Apps Traps - How Safe Are The Applications You Download?

When downloading applications on your smart phone, have you ever checked the permissions you are giving to the provider of the (sometimes"free") applications?

Here are descriptions of some of the permissions found on applications:

Phone Calls
Read phone state and identity. Allows access to phone features and can determine the number that the call is connected to.
Question: How many people are aware that their information is exposed when they call a friend who has given this permission?
Directly call phone numbers. Allows the application to call phone numbers without your intervention.
Question: When did you last check your phone bill for unexpected calls? You may be paying for someone else's phone calls...

Hardware Controls
Take pictures
Allows an application at any time to take pictures with the camera and collect images the camera is seeing.
Record audio
Allows application to access the audio record path.
Question: How much sensitive and private information is being exposed to prying eyes and ears without people being aware of this? One application with this permission has over 50 Million downloads. Are phones allowed within secure locations? Are they checked for downloaded apps?

Modify/delete SD card contents
Allows an application to change and remove information on your SD card
Question: What information is being accessed, modified or deleted?

Your personal information
Allows an application to add or modify calendar events, read all contact address data stored on your phone and send your data to other people
Question: What can someone do with this data-mining goldmine? With access to calendars - advance knowledge on planned events and the ability to change the dates?

Network communication
Allows an application full internet access.
Question: Is there a legitimate reason why this application needs full internet access?

Your location
Allows an application to determine where you are.
Question: What can someone do with this information? They know where you are and where you are not. Who would like to know this and could benefit from this knowledge?

Your accounts
Allows an application to request authentication tokens, get a list of accounts known by the phone, add and remove accounts and deleting their password.

Question: How many people experience a "glitch" with accessing their accounts and do not realize their accounts may have been accessed by an outsider? One application with this permission has over 5 Million downloads...

Conclusion
A lot of sensitive information is exposed to third parties by giving permissions while downloading applications. There are many applications that do require certain permissions (for example a program like Outlook will need to be able to access personal information and make changes to contact addresses), but others do not (why would a flashlight application need permission to take pictures?). Do not download any applications without checking the permissions you give and without checking if there is a legitimate reason for the permissions requested. It's better to be safe than sorry...

If you enjoyed this article, I would like to invite you to our free Prosperity Mentor Newsletter - filled with articles, inspirational quotes, book and website reviews. Our mission is to bring prosperity to people and to change lives one at a time. Please visit our website at http://prosperitymentorllc.com/


View the original article here

No comments:

Post a Comment