Beware of Mobile Apps
Debesh Choudhury, PhD
Information Security Researcher, Academician, Entrepreneur | Password & Cybersecurity, Data Privacy, Blockchains, Digital Identity, Biometrics Limit | 3D Education | Writer | Linux Trainer | Podcast Host
Often you will find emails and messages from top companies claiming "The features are better in our mobile apps."
I always get emails from my credit card company writing, "Use our mobile apps, and unlock more features at your fingertip."
I also get emails from LinkedIn for using their mobile apps.
There must be some reasons for their promoting mobile apps.
Do you know why companies are continually requesting you to download and install their mobile apps?
Maybe, a few features they haven't provided on the web portals via web apps, which they bundle into the mobile apps.
But what is the reason for not giving all the features on the web app or the web portal?
This includes authentic apps of the companies downloaded from reliable mobile app stores.
If you prioritize security over convenience, follow these steps.
领英推荐
If you have to use mobile apps for banking transactions while traveling, reactivate the particular financial app when necessary, and deactivate it immediately after the completion of the banking transaction.
------------
About me
I am a researcher and contribute to the overlapping areas of STEAM (Science, Technology, Engineering, Arts, and Mathematics). I am an active user and promoter of GNU/Linux, Free and Open Source Software. I develop cybersecurity and information security solutions, specifically graphical authentication security.
Text Copyright ? 2023 Debesh Choudhury — All Rights Reserved.
Cheers!
Cover:??I created a GIF using my texts and an image by Steve Buissinne from Pixabay.
All other images are either drawn/created by myself or credited to the respective artists/sources.
Disclaimer: All texts are mine and original. Any similarity and resemblance to any other content are purely accidental. The article is not advice for life, career, or business. You'll be able to do your research before you adopt the options mentioned in the articles.
Join me at
Earn passive income by sharing unused Internet bandwidth on?Honeygain?and?Peer2Profit.
Kolkata, Friday, October 13, 2023.
#smartphone #apps #data #funnel #learningtimes #debeshchoudhury
Beta-tester at Parrot Security* Polymath*
1 年Because mobile is the bane of security ? TY Debesh Choudhury, PhD
Personal Brand Expert, Certified Image Consultant, Business Etiquette Coach, Speaker and Writer
1 年Debesh Choudhury, PhD very helpful information, thank you for sharing
Information Security Researcher, Academician, Entrepreneur | Password & Cybersecurity, Data Privacy, Blockchains, Digital Identity, Biometrics Limit | 3D Education | Writer | Linux Trainer | Podcast Host
1 年Follow Debbie Reynolds for data privacy and cybersecurity insights.
CEO of iUniq and inventor of "Credential Free Identity"
1 年Debesh, sadly it isn't always possible to remove some Amazon, Google, manufacturer's and other preinstalled apps from a phone. This pervasive control is insidious. But If the app isn't of value it's gone. Where they are not removable they should be stripped of access and resources For me all that's left is the carrier, browser, map and a music player. Oh yes, the camera and flashlight.
Finl distribution. Products for smart Homes..& buildings and projects including healthcare sector . Smart. Com for all segments Technical help for green building&sustainable communities.We contribute to your growth .
1 年Useful advice . However why there is not much security layer build to safeguard data of web , or on app to another app. Why govt regulation and technology of full proof privacy not I place . How long it takes for an app to fish out data , may be seconds . This whole technology has anyway exposed all our data to the world .