Change the state of network connectivity Call phone numbers and send SMS messages Record audio, and take pictures and videos Read your phone’s call log Read your contact data, including who you call and email and how often Read personal profile information stored on your device Get a list of accounts known by the phone, or other apps you use
The main drivers behind this are national security and making money, and not in this order.
postneoludite: No, but I taped over my webcam just in case.
Some people that have "built in" cams on their computer systems probably don't even think about it. But quite simply if the port is opened and someone knows how to go there then they can view what ever is on the other side. lol. Of course people that have added a cam can either unplug it or use the little blinder that many come with.
postneoludite: The new mandatory Facebook app can:
Change the state of network connectivity Call phone numbers and send SMS messages Record audio, and take pictures and videos Read your phone’s call log Read your contact data, including who you call and email and how often Read personal profile information stored on your device Get a list of accounts known by the phone, or other apps you use
The main drivers behind this are national security and making money, and not in this order.
Dragos1: Oh Peach, I was only playing. I am not a G-Man. lol....just the Hair Guy.
How do these white caps break hack into our profiles and read our messages ,why do they bother to do these things are they crazy ,,thete no money to be gained from it,,must be like a game to them,,sad very sad.
peachmelba: How do these white caps break hack into our profiles and read our messages ,why do they bother to do these things are they crazy ,,thete no money to be gained from it,,must be like a game to them,,sad very sad.
Unfortuately, MANY people do taxes, banking, etc, etc online these days. Although the sites they deal with are 128 bit encrypted, people sometimes store personal information, unencrypted, without firewall, on their personal PC's or devices - there is much to be gained,....think of it like cyber pickpockets,....they want what you have, are slippery, devious, well-trained, knowledgeable,....hang on to your valuables.
A_Non_A_Moose: Unfortuately, MANY people do taxes, banking, etc, etc online these days. Although the sites they deal with are 128 bit encrypted, people sometimes store personal information, unencrypted, without firewall, on their personal PC's or devices - there is much to be gained,....think of it like cyber pickpockets,....they want what you have, are slippery, devious, well-trained, knowledgeable,....hang on to your valuables.
Yes bit why do the hackers do it when no money involved,I don't even use email I can't be bothered,and forget my own password to it,:: .
Mny reasons. Firstly, they don't know what you have on your computer until they gain access. Secondly, because they CAN! Why do people vandalize? No gain to be had, but because they can, they do! Thirdly, a dislike of those they hack. China is notorious for hacking,....simply because of an anti-west sentiment. Fourthly - collateral damage. In an attempt to hack a network, those on the network, whether of value to the hackers or not, fall prey.
A_Non_A_Moose: Mny reasons. Firstly, they don't know what you have on your computer until they gain access. Secondly, because they CAN! Why do people vandalize? No gain to be had, but because they can, they do! Thirdly, a dislike of those they hack. China is notorious for hacking,....simply because of an anti-west sentiment. Fourthly - collateral damage. In an attempt to hack a network, those on the network, whether of value to the hackers or not, fall prey.
Yes of course like in real life really and stalkers too.
Report threads that break rules, are offensive, or contain fighting. Staff may not be aware of the forum abuse, and cannot do anything about it unless you tell us about it. click to report forum abuse »
Are You Afraid of the Internet?(Vote Below)
Change the state of network connectivity
Call phone numbers and send SMS messages
Record audio, and take pictures and videos
Read your phone’s call log
Read your contact data, including who you call and email and how often
Read personal profile information stored on your device
Get a list of accounts known by the phone, or other apps you use
The main drivers behind this are national security and making money, and not in this order.