- If Apple, through a programming glitch, has the ability to allow someone to use your iOS device as a microphone to listen to your conversations without you even touching the device or knowing it was in use, then Apple can do the same thing through purposeful programming.
- If Apple can use programming to access your microphone, then it can also access your camera the same way.
- If Apple can do this, so too could nation states with sufficient access to the programming (If you doubt this, read this story of UAE hackers).
- If Apple and nation states can do this, so too can criminal hackers, with sufficient access. (Tuma explains more about this on WIOD in Miami, FL)
For decades our whole society has enjoyed the benefits of technology without accepting the responsibility of guarding against the privacy and security risks that go along with it. We have taken those things for granted and now it is time to pay the piper and become more responsible by being more cyber aware and using good cyber hygiene.
This is not just for the companies that provide this technology and collect and use our data. This is for all of us — we the people must learn to protect ourselves against these risks. (Tuma explains more about this on WJIM in Lansing, MI)
Here are a few points to consider to think about how we can do this:
- There is no such thing as 100% security when it comes to technology or data. There is always some measure of risk involved in the cyber realm.
- As you go through your day, imagine someone is listening and watching you through your telephone and think about what aspects of your private and business life you are unecessarily exposing through the technology and data we use.
- This isn’t intended to be alarmist and suggest that you purge all technology from your life, however, there are ways to minimize unnecessary risk:
- Do you really need your telephone in the private places you go, like your bedroom or restroom?
- Do you really need to share your company’s deepest, darkest secrets in an email when it could have been done in person?
- Do you need to have your telephone sitting on the table when you are discussing extremely sensitive private personal or business information, or, would that conversation go just as well (or even better) without the telephones?
“We’re going to start hearing stories now of people who had sensitive information revealed.” @shawnetuma explains the implications behind the recent glitch in @Apple’s FaceTime on #FOXNewsRundown https://t.co/UrjQiWWAEt
— FOX News Radio (@foxnewsradio) February 4, 2019