Wednesday, 12 March 2014

How apps invade your privacy

Apps Apps everywhere!! Well this is what has happened to Mobile World. This can be called as an App(Application) Era where every small thing has the capability to reach globally to millions of  users. The reason is that App creation is not fixed with a specific topic. It could be anything from "Learning ABCD...XYZ" to various Informatory apps and anything. Like I said it's not limited. These Apps can be made of just anything and everything. 
Since these apps are fun to use there are some loopholes which we the users need to identify whilst installing them. When we download an App, it ask for certain Permissions and this is where we need to be smart. Attackers have developed an system by which they can access your phones each and every feature.This means you aren't safe.




We take up an example of Android operating system since it's the most widely used OS of this app era and the main target of number of attacks by the hackers. 
Whenever you download an app and try to install it, it asks for many permissions. For example 
your personal information , location, storage, phone calls etc. 
No the fact of the matter is why these many permissions? Why do a simple app or a gaming app need phones information to read a contact or write contact data.. Why does it need details of services that cost you money? Location, Storage.. etc.
Well all these permissions are nothing but a hackers way of saying "Can I hack you? Would you allow me?". And most of the users without reading all permission a certain app is demanding, click ALLOW. This is where hard time starts for a user. 
Since there are many clones of many official apps available in Google's PlayStore it's difficult to identify which one is the official one. And many users end up using Clones. 
When clones are installed i.e when these apps are allowed access from users at that time each and every feature in users phone becomes a victim. 



Systems like these are developed by hackers. The permissions which a user gives is actually seen by hackers in such a way. Now he can know your each and every detail. 
Hacker now have access to your contacts, logs, messages you exchange with family and friends. Some of the users save important passwords of bank accounts or email accounts in drafts, all of them are  compromised. It's easy for an hacker to know your location too and attack you physically if intended. 

Conclusion:- Be safe. Don't be a prey.

No comments:

Post a Comment