The concept of spying old also is imprinted in our minds in binoculars and tools for phone tapping and other methods that we've seen a lot of movies, but keystroke loggers today as we now know them all on behalf of the Hackers Hackers no longer have the need for those traditional methods, thanks to the technology that we use every day become they can track and record every move we make.
Technology has enabled a new way to spy and can become your your watch for predators after they are thousands of miles away from you, and provided technology and modern techniques also have new horizons did not have that Aisaloha without it.
In our article we will mention this to you 7 techniques we use almost daily basis can be an eye on you watching, recording her every move without knowing or feel.
Computer
Accounts different on all social networks, code and search engines used by the Web sites that request your personal data could be exploited directly by the service providers themselves or indirectly by the hackers can access all this information through the penetration servers of those services, which is unlikely, and read always in the news for those leaks of personal information, whether intentionally or unintentionally.
Another risk for both personal computers or mobile office which cameras, it is possible to run those cameras remotely to your watch without feeling. You may not believe this matter and considers exaggerated, but the reality, and in fact may be you yourself have used this technique before and do not realize it. If you're a hardware company "Apple" either laptops or mobile or "iPad" There is a property iCloud that lets you track your device if stolen by the GPS and also enable you to control the device remotely Bglgah or wipe your personal data from it or even turn on the camera and take pictures of the thief. Despite the fact that a service like this is designed to protect personal, but that as soon as the arrival of the penetrator or Almottagss for your password can be used against you, and then Say goodbye to privacy.
As for the desktop is endless, choices in front of hackers and spies variety, they can use the properties are built into the operating system itself is also designed for you to control your device, such as a property remote assistance or remote connection Remote Desktop Connection, and they can also use programs such as GoToMyPC and that once it is install it on your computer (without your knowledge) will be able to run from penetrating the camera and microphone and control other things.
As you probably noticed most of the means that can be used against you are actually designed to protect you or to serve, but in the event of loss of control (password) can be transformed to serve others, and there are a lot of advice from security experts to avoid such situations, including the use of complex passwords, or two-stage , and including the failure to install or download anything I'm not sure of the source, including traditional methods like putting a lid on the camera and microphone in the case of non-used (which is more roads safer from my point of view), and I am going in an article later about some of the new technologies that have been developed specifically to overcome the problem of penetrating various types of personal devices.
Street lamps
May be surprised from the above address, but this is the reality for residents of the United States and Britain, and there are other countries in the way. A company known as Illuminating Concepts launched a project called Intellistreets where are installing wireless smart lamps in villages and cities can be operated remotely in order to maintain discipline and protection. These lamps are not just traditional lights, but fitted with a sound system and digital signage broadcast information alive for people, such as warnings and guidance in emergency situations, but next to it, and next to its core function of lighting the roads efficiently they are equipped with cameras and microphones operate around the clock and convey what is recorded directly to the hand entrusted with the management this system.
Despite the many advantages offered by such a project, there are concerns can not be ignored as well. While authorized developer for this project, and governments that is designed to protect individuals and note traffic and advertising and general guidance, see the visionary who appreciate the privacy that there is a flagrant violation of their rights. [1 2]
Mobile
When we talk about modern mobiles can be extended to tablet computers and digital diaries also relate to as long as the Internet. Today these devices are perfectly matched for desktop computers and mobile at all, but it increases the possibility of making calls, and therefore we can add what we have mentioned in the previous part of computer to mobile devices and tablet devices.
Months of the means that can be exploited to the heart of your PC to spy mobile applications in your pocket that you install it, and can be separated into three types. The first type programs a reliable source, but you do not cost yourself to read the user agreement before installing them, and that after your approval have been approved legally to spy on you, for example, last position was subjected to the agreement to use the conversation private Balfaspock, when you read it you will find explicitly allows for the application to run microphone at any time and capture audio without your knowledge! Is not this a clear violation of privacy?
The second type of application is not a reliable source applications, are originally designed for the collection of personal data on the phone and send reports to use its designers often we install all of these programs without care about the consequences. The third type are applications are installed without your knowledge through the back door (gap) in the phone system and most famous examples of this type is a scandal and the National Security Agency, the recent American NSA where it was found next to complicity in spying on personal data in social networks they own application malignant named DOPOUTJEEP the installed surreptitiously on the phones, "iPhone" allows them to see and pull a copy of the files on the phone and SMS messages and contacts and voicemail messages and the current location of the phone and run the microphone and camera, and a lot of other possibilities that make the phone a spy actually.
There are other applications on a common system "Android" can be used to penetrate the cell and see the messages, contacts, photos, and run like the microphone mSpy and other applications for Windows systems for the iPhone since all phones that could be targeted. [1234]
TV
Address may be a surprise but of course we are not talking about the traditional television sets that rely on satellites, but we're talking about TV sets connected to the Internet Internet TV which is currently deployed in abundance in the United States and Europe. Just connect the TV to the Internet sponsor cautious, but we are going to a greater risk that these devices are also equipped with cameras recording everything you do. The company launched "Intel" since the period of service of Web TV and supplied subdivision cameras to monitor user behavior and to propose programs that will watch based on his behavior and printing, as it will help them in choosing the ads also suitable for personal inclinations and this also can be deposited privacy.
It does not stop when the TV sets only, there is a modern gaming platforms with camera and microphone allows the player to interact with the game without control devices and the platform because they are connected to the Internet at the same time allowing those who wish to see you during play to penetrate the system and simply have fun doing it. [1 2]
Household appliances
After the enormous technological revolution taking place in the world today emerged what is known as the Internet of things Internet of Things, a term that means everything that you can think about it now, so you are personally connected to the Internet, has been a big part of so far this term, today you can prepare a cup of coffee or run the stove or air conditioner or washing machine from a distance using a phone or personal computer. Since the smart home has become a phenomenon where everything is connected interconnected in a single system and connected to the Internet, can control these things before others can also learn your habits and what you do in your home without your knowledge, can also be exploited to access the system to protect the house decrypted or run Cameras surveillance cameras or even other computers and mobile for your watch.
According to the director of the CIA former Vanturnt things is a gold mine for them and has can determine anything and monitored and controlled remotely, technologies such as RFID Radio Frequency Identification Technology and Sensor Networks and other modern technologies can also contribute to make this possible.
Implanted medical devices
Implanted medical devices are electronic devices planted by the membership of the parts inside the human body in order to preserve his life to a malfunction in a job or members. A famous example is very scattered in abundance defibrillators known maker Stepping Pace Maker, which was my field beforehand, after installing the device in the patient's chest and connected to the heart we must program it in a specific commensurate with the status of the patient's heart and this is done it on a regular basis and it is not logic that the patient's chest is opened every time it is contact with the device wirelessly using radio waves, and we program it. Now imagine if there is a way by which a people who want to hurt you to penetrate this device, I think that the result is known, and in fact this is possible actually has detected a pirate moralists Barnaby Jack warned him was to kill him after his statement several days, which means that there are those who use this actually means in the assassination of other people, and this is why the American Vice-President in 2007 to disable wireless pacemaker in his heart to prevent any attempt to assassinate him.
It does not stop when defibrillators only, there are devices electrocution Cardiac Difibrillator which is also used to stun the heart shipment electric automatically in the event of a stop, and there are insulin pumps Insulin Pumps performed with diabetes installed to inject doses of insulin automatically in the blood which can penetrate also inject overdose to kill the patient. [12]
Wearable Technology
Hours clever, bracelet smart, bracelet can know your mental, bracelet tracks your health, glasses Google, smart clothes, are all manifestations of modern technology, known as Wearable Technology or technical tools wearable, which is approaching day by day to become an integral part of human To include all areas of life.
Is unlikely to use these techniques to penetrate the privacy also, in the end, it's just electronic devices connected to the Internet, like all of the above at the top. Google Goggles can be exploited to spy on you just like Mobile has already happened in the month of March and the researchers developed a program that can penetrate Malnotes glasses Google, which means that even a strong company like Google has not been able to protect their product from penetration. It can also see your health through these bracelets that monitor your medical condition. In the city of Disney entertainment Visitors wearing a bracelet electronically on the wrist where they can do everything such as a purchase and the opening of the hotel rooms and the use of leisure tools, and at the same time, the bracelet sends all this information to the management.
And now that you know all of these techniques manufacturer to spy on you, you will seek, or rather, you can, without them?

0 Komentar