Home » Cameras, smartphones and tablets. Here’s how to neutralize the spying – Tech

Cameras, smartphones and tablets. Here’s how to neutralize the spying – Tech

by admin
Cameras, smartphones and tablets.  Here’s how to neutralize the spying – Tech

Cameras and microphones able to spy on us in our homes as in a virtual Big Brother. The scenario that emerged from the ‘Rear window’ operation is an alarming scenario. The survey, which involved 10 cities throughout the country, pushes us to broaden the look at it, becoming aware of the risks inherent in the technology we use every day. Access doors for hackers Video surveillance cameras, computers, cell phones, but also tablets, smartwatches and intelligent voice assistants. There are several devices that, if violated, can turn into real access doors for hackers able to transmit images and private conversations outside without our consent. “It is not a risk, but a certainty that we do not want to be aware of – says Umberto Rapetto, IT security expert, former commander of the technological anti-crime group of the Guardia di Finanza (GAT) -. We traded a modicum of comfort for a quintal of personal confidentiality. The technological tools of daily use bind us and at the same time make us transparent for those who want to know everything about us. Images and sounds that accompany our day are acquired, stored, transmitted, reused without being aware of this snatch continuous and incessant. Microphones and video cameras steal the moments of our life strengthened by our inability to separate ourselves from certain electronic ‘gadgets’ “. How cybercriminals act “Multimedia contents move online without excessive precautions and devices – explains Rapetto – are easily locatable by those with bad intentions: you know the companies that produce those tools, the operating and communication standards, the pre – set by the manufacturer and often not customized by users. It takes very little to replace the legitimate user and peek into the house of the unfortunate person on duty “. The pitfalls for children Surveillance systems for …

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy