Why mobile is far more riskier than Aadhaar leak

What do you do when you buy a smartphone? Install Facebook and WhatsApp after the mandatory settings are put in place. While the next set of downloads involving third-party apps follows soon after, the catch is we rarely go through their permission policies.

A closer look at the permission policy of one of the most commonly used applications such as Facebook, for instance, reveals that it asks for access to all of the subscriber’s contacts and information stored in the handset. Moreover, it also seeks to have access to the device camera and to make calls, without informing the user. While Facebook is a proprietary app, the rule remains the same for many third-party applications, whose origin and ownership remain unknown to most of us.

At a time when data leaks from the Unique Identification Authority of India (UIDAI) — the body that maintains the Aadhaar data of over a billion Indians — are raising disturbing questions over the security of one’s personal information, breach of privacy can come from one’s handheld device. From biometric details such as fingerprints and retina scans to financial information such as credit card numbers and passwords — all may be up for sale if one’s handset is hacked.

And while the possibility of a mobile hack was of little concern a few years ago, that is no longer the case now. The falling price of the International Mobile Subscriber Identity (IMSI)-catcher and a flurry of other malwares have now changed the tide against common users. IMSI, for example, is today widely used (by hackers) to identify a user of a mobile network, making analysts and experts jittery.

While users of all types of mobile handsets can be targets of hacks, users of open operating systems such as Android, which comprise over 80 per cent of all mobile users globally and over 90 per cent in India, are most vulnerable.

“Any information stored in the mobile phone can be accessed from a remote location. Once a malware or advanced virus gets into the system, it can copy and send all information to the hackers.

It can also enable the camera, forward text messages, redirect calls and send any files from the device, without the user even knowing about its activity,” Such incidents are not rare. According to anti-virus major Norton’s recent mobile survey, over a third or 34 per cent of mobile phone users in India have faced malware or virus attacks recently, followed by threats involving fraudulent access or misuse of credit card or bank account details (21 per cent). The share of people facing hacking and leakage of personal information is no less. Nearly one in five (19 per cent) mobile users’ privacy has been breached in recent months, the survey says.
As half the users (50 per cent) grant permission to send promotional texts and/or emails to application providers, the threat levels are only rising. The survey reveals that 47 per cent of users have granted access to their contacts in exchange for free apps. And close to 40 per cent have granted permission to access their camera, bookmarks, and browser history.

Experts say while the damage from leakage of personal data like images, documents, and financial details may still be compensated, once biometric data is compromised, the loss is irreparable. As an increasing number of smartphones now comes with added features such as fingerprint scanners and iris scanners, such biometric data stored in devices may land up in the hands of hackers. However, once lost, these cannot be changed to secure one’s identity unlike passwords and account details.

“Digital security is still an afterthought for many. Getting a new mobile phone scratched is more worrisome than the risk of having it infected by a virus. While desktops and laptops do get the attention they need for their security, mobile phones still have a long way to go in this aspect. It’s time individuals and businesses realised that viruses, malware, and Internet threats do not only prey on computers. more  

View all 10 comments Below 10 comments
Care in mobile can be maintained. Aadhaar on the other hand is in government control, which means no one knows who has access and who does not. and government can control our lives. For example government is now saying without Aadhaar, my mobile service will be disconnected. Same with banking service. While FB and other social media can sell your data that you upload in the media or save on the mobile (only contacts etc), they cannot directly affect our lives. I can even just uninstall the app from my mobile. Also my banking or other apps will not share their information with the social media apps. FB can only track what I do online. Not what I do on a daily basis. Aadhaar linkage has that risk. One needs to understand the implementation of the project, access controls, lack of security, the private companies who are managing the service, etc, all into consideration. Would be good for everyone to understand the situation of Aadhaar. more  
there are enough duplicate or fake aadhaar cards. in Hyderabad itself one address was registered with 275 aadhar cards in different names.

A card was even issued in the name of 'Barak Obama' just to show how leaky this system is. more  
What details do Aadhaar Card possess to ruin a Citizen is the issue WHILE IT CURBS Corruption, Black Money, identifies Concealed Wealth WHICH ALONE COUNT BILLIONS OF CRORES . more  
Write up of Shri Mohit Jain should form a manual to all mobile phone users. particularly amongst the youngs (girls, in particular). I shall urge all mobile phone users (again particularly girls), not to share their mobile numbers with someone not thoroughly acquainted with them. Receipt of phone calls from strangers - more than 2 or 3 occasions - need be recorded with the police. The caller should warned beforehand. more  
The Facebook collects more all personal info of the mobile user. It also recommends friend suggestion based on the details of the personal data of the user. Almost all the suggestions are based on the personal details collected by it. It is likely that they could or someone else also could use it. IT IS GOOD THAT THE CELL IS USED TO TRANSACT IMPORTANT TASKS WITHOUT REVEALING THEIR IDENTITY . more  
It is our weakness that we want all applications on our mobile phones. We should limit use of mobile phones for essential and secured services. Social media like Facebook should left on laptops or computers. more  
I totally agree with and endorse the views of Shri Mohit Jain. One should never keep important information on one's mobile. Likewise on one's computer too. I keep all info on an external hard disk. more  
I guess google play store audits all apps before lodging it on their site.They have been removing regularly the apps. The contact details the apps ask for is basically for expanding their network and for marketing. more  
Post a Comment

Related Posts

    • 53 commonly used drugs unsafe failed quality test

      53 medicines including paracetamol failed in quality test!! Attached is the full list. Apart from vitamins, sugar and blood pressure medicines, antibiotics are also included in the list...

      By Amit Mishra
      /
    • Devices becoming bimba

      As we saw in Lebanon how pagers and walkie talkie were exploded by the israelis, devices will be used for surveillance and attacks of different kinds in the not so far future. Medical de...

      By Ruchika L Maheshwari
      /
    • AVOIDABLE TRAGEDY

      The majority of Indians are deeply spiritual, with a wide array of religious beliefs. This diversity in belief is not inherently problematic; in fact, many people seek the grace of the Almighty for...

      By Jayakumar Daniel
      /
    • Drugs that have failed quality tests

      Full list of drugs that failed quality tests. Do share with friends family so if they are taking them they find replacements or consult Doctors Cyra Tablets, Rabeprazole Sodium Tablets I...

      By Sarita Ravichandran
      /
    • Bhartiya Nyay Sanhita needs to be rolled back

      In just 15 days, from the 01st of July, the Indian law system will be turned on its head. The BNS is about to begin. Bharatiya Nyay Sanhita (BNS) gives massive powers to local...

      By Ruchika L Maheshwari
      /
    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)