{"id":6018,"date":"2011-05-20T14:44:55","date_gmt":"2011-05-20T07:44:55","guid":{"rendered":"http:\/\/www.cdicconference.com\/test\/?p=1641"},"modified":"2022-04-20T07:46:17","modified_gmt":"2022-04-20T07:46:17","slug":"new-security-threat-against","status":"publish","type":"post","link":"https:\/\/oldsite.acisonline.net\/?p=6018","title":{"rendered":"New Security Threat Against"},"content":{"rendered":"<p><!--:en-->GPS feature is not only in GPS device for car anymore, Most smartphones today have GPS capabilities built in and have a new feature &#8220;geolocation services&#8221; or &#8220;location service&#8221; for new smartphone location-aware application including social network application such as facebook, twitter, foursquare and google latitude. The location service provides the latitude, longitude, speed, direction, and altitude of your phone to requesting applications. Even if mobile geolocation services have supported several useful and convenient mobile applications, these services also raise the potential security risks to the users. Like any tracking technology, geolocation service can make the application more personalized, but this personalization is attractive to both law enforcement and malicious parties. So, by enabling geolocation service on user\u2019s smartphone, it would result in security and privacy issue to the users.<br \/>\nFor any smartphone, if geolocation or location services are activated on the smartphone (unfortunately, many smartphones unsecured by default) , the current and historical physical user location will be continuously tracked and mobile phone makers also create a database that identifies and record the location of mobile cell towers and Wi-Fi access points. Then, these data can be used to identify an approximate location of the user\u2019s device by comparing the mobile cell tower and Wi-Fi access points that a user\u2019s device is connecting to the data recorded in location database. This data is also used by other &#8220;Location-Aware Applications&#8221; on user\u2019s smartphone. Location-aware applications are growing rapidly in number and variety for smartphone devices that are GPS-enabled. These applications will continue to evolve rapidly to address consumer needs. If users allow specific location aware application to access their location data, it can connects with location services and use the user\u2019s current location status to customizes content and behavior of Location-Aware application on Smartphone device. Please be careful when using social network location sharing to \u201cpost\u201d your whereabouts online or whenever you \u201ccheck-in\u201d to a location by using location-aware application such as foursquare. The good things about location services is tracking feature , you can track, lock or wipe your lost\/stolen smartphone, for example you can use \u201cfind my iphone\u201d free software to find your lost\/stolen iphone\/ipad.<br \/>\nRootkit attacks (by hackers) on smartphones or upcoming tablet computers could be more devastating because smartphone owners tend to carry their phones with them all the time. This creates opportunities for potential attackers to eavesdrop, extract personal information from phone directories, or just pinpoint a user&#8217;s whereabouts by querying smartphone&#8217;s Global Positioning System (GPS) receiver. This would enable an attacker to track the owner&#8217;s whereabouts. Finally, they showed a rootkit turning on power-hungry capabilities, such as the Bluetooth radio and GPS receiver to quickly drain the battery. An owner expecting remaining battery life would instead find the phone dead. Smartphones also have new ways for malware to enter the system, such as through a Bluetooth radio channel or via text message.<br \/>\nA safety warning to users of smartphones that have GPS\/Location Services. Pictures you\u2019ve emailed or uploaded to the web with a Smartphone can leak location information threatening the safety of your children and you. Hackers and strangers can track down your home, place of work or school with a click of the mouse and with free browser add-ons that translate data into maps.<br \/>\nThe solution is very simple, as the location-aware application on GPS-enabled smartphone intends to deliver a better user experience by customized content based on user\u2019s location, the smartphone owners can still choose to disable (turn off) it if required or concerned about security and privacy issues.<br \/>\nThe information below is a quick guide to disable location services completely on your smartphones.<\/p>\n<p style=\"text-align: left;\"><strong>iPhone\/iPad:<\/strong><br \/>\n1. Tab on Settings<br \/>\n2. Tab on General<br \/>\n3. Tab on \u201cLocation Services\u201d<br \/>\n4. Select the On\/Off switch on \u201cLocation Services\u201d or On\/Off switch on each application<\/p>\n<div id=\"attachment_1642\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1642\" rel=\"attachment wp-att-1642\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1642\" class=\"size-full wp-image-1642 lazyload\" title=\"iphone,ipad\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/09\/124.png\" alt=\"iphone,ipad\" width=\"300\" height=\"375\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/375;\" \/><\/a><p id=\"caption-attachment-1642\" class=\"wp-caption-text\">iphone,ipad<\/p><\/div>\n<p style=\"text-align: center;\">\n<p><strong>BlackBerry:<\/strong><br \/>\n1. Click on Options<br \/>\n2. Clicks on Device<br \/>\n3. Click on Location Settings<br \/>\n4. Select Location Off\/ On on \u201cLocation Services\u201d<\/p>\n<div id=\"attachment_1643\" style=\"width: 373px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1643\" rel=\"attachment wp-att-1643\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1643\" class=\"size-full wp-image-1643 lazyload\" title=\"BlackBerry\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/09\/213.png\" alt=\"BlackBerry\" width=\"363\" height=\"287\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 363px; --smush-placeholder-aspect-ratio: 363\/287;\" \/><\/a><p id=\"caption-attachment-1643\" class=\"wp-caption-text\">BlackBerry<\/p><\/div>\n<p><strong>Android:<\/strong><br \/>\n1. Tab on Settings<br \/>\n2. Tab on Location<br \/>\n3. Uncheck \u201cUse Wireless networks\u201d or \u201cUse GPS satellites\u201d<\/p>\n<div id=\"attachment_1644\" style=\"width: 272px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1644\" rel=\"attachment wp-att-1644\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1644\" class=\"wp-image-1644 lazyload\" title=\"Android\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/09\/36.png\" alt=\"Android\" width=\"262\" height=\"373\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 262px; --smush-placeholder-aspect-ratio: 262\/373;\" \/><\/a><p id=\"caption-attachment-1644\" class=\"wp-caption-text\">Android<\/p><\/div>\n<p><strong>Windows Phone 7:<\/strong><br \/>\n1. From Start, click left to the App list, and then taps Settings.<br \/>\n2. Tap Location and then turn off Location services.<\/p>\n<div id=\"attachment_1645\" style=\"width: 405px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1645\" rel=\"attachment wp-att-1645\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1645\" class=\"size-full wp-image-1645 lazyload\" title=\"Windows Phone\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/09\/42.png\" alt=\"Windows Phone\" width=\"395\" height=\"238\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 395px; --smush-placeholder-aspect-ratio: 395\/238;\" \/><\/a><p id=\"caption-attachment-1645\" class=\"wp-caption-text\">Windows Phone<\/p><\/div>\n<p style=\"text-align: center;\">\n<p><strong>Symbian:<\/strong><br \/>\n1. Select \u201cMenu\u201d<br \/>\n2. Select Options<br \/>\n3. Select \u201cDisable My Location\u201d<br \/>\nOnce location service is disabled on smartphone, no location data will be recorded, maintained and transmitted. So, none of location-aware application will be able to customize content based on user\u2019s location data<br \/>\n<strong>Digital cameras with GPS-enabled functions also a concern<\/strong><br \/>\nCameras with a GPS function record location information in both images and movies. Most give you the option to turn the function on and off via a settings menu. When a camera is turned off, it continues to receive a signal from GPS satellite for a time, and will record the route taken. The information is typically recorded in a GPS log file, not in image files. If you do not wish to record a GPS log file, set it to off. Check your camera manual for complete instructions.<br \/>\n<strong>How Exchangeable Image File Format (EXIF) is a Security Threat<\/strong><br \/>\nExchangeable image file format (EXIF) is a standard that specifies the formats for images, sound, and ancillary tags used by digital cameras (including smartphones), scanners and other systems handling image and sound files recorded by digital cameras<br \/>\nThe EXIF format has standard tags for location information.Currently, a few cameras and some higher-end mobile phones have a built-in GPS receiver and store the location information in the EXIF header when the picture is taken. Some other cameras have a separate GPS receiver that fits into the flash connector or hot shoe. Recorded GPS data can also be added to any digital photograph on a computer, either by correlating the time stamps of the photographs with a GPS record from a hand-held GPS receiver or manually using a map or mapping software. The process of adding geographic information to a photograph is known as geocoding. Photo sharing communities like Panoramio, locr or Flickr equally allow their users to upload geocoded pictures or to add geolocation information online.<br \/>\nDigital cameras are everywhere today, whether they are standalone or built into cellular telephones. 9 out of 10 people today have some sort of digital camera with them at all times; mainly because most cell phones today have them built-in. The explosion of social networking sites like MySpace, Facebook, and Twitter have created an easy and convenient avenue for individuals to share their pictures with friends and family. Social networking sites have proved to be invaluable business tools but have also been identified as a security risk. The same goes for Exchangeable Image File Format (EXIF). EXIF is metadata that is stored inside a digital image. In other words, EXIF embeds information about the digital image inside the file.<br \/>\nMost digital cameras capture EXIF information which usually consists of the date\/time, ISO speed, whether or not a flash was utilized, focal length, etc&#8230; It is important to note that EXIF can contain hundreds of lines of information. If the camera has Global Positioning System (GPS) capability, mainly seen in Smartphones such as the iPhone, Blackberry, and Android, the EXIF will capture the GPS coordinates when the photo was taken. Many refer to this information as &#8220;geotagging&#8221;. Geotagging information found in EXIF data which is uploaded to social networking sites may pose a significant security threat.<!--:--><!--:th--><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GPS feature is not only in GPS device for car anymore, Most smartphones today have GPS capabilities built in and have a new feature &#8220;geolocation services&#8221; or &#8220;location service&#8221; for new smartphone location-aware application<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,151],"tags":[662],"table_tags":[],"class_list":["post-6018","post","type-post","status-publish","format-standard","hentry","category-acis-articles","category-cybersecurity","tag-security-threat"],"_links":{"self":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/6018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6018"}],"version-history":[{"count":1,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/6018\/revisions"}],"predecessor-version":[{"id":9239,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/6018\/revisions\/9239"}],"wp:attachment":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6018"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftable_tags&post=6018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}