Your own personalised stalker
It always seemed slightly creepy that your computer shows advertising that is strangely accurately targeted at things you might have been interested in. On the surface, that seems quite useful. If you have to tolerate ads on your screen, at least having them show things you were interested in seems helpful.
Instead, we wonder how the system knows. It feels like a breach of our privacy.
It all starts when you install an app, and it pops up a question asking for permission to use your location, and/or your camera and/or your microphone.
This is useful for advertisers. For example, they can use your location. If the app reports this back to the content provider, they can match up your location and compare you to other people nearby. If you tend to go to the same places as other people, you are probably interested in the same things, so an advertiser might use that assumption to present advertising to you, or other people that you spend time with.
That does sound a bit overreaching, but we reluctantly agree to the presented terms simply because we want to use the app. If that is a condition of use, and we want to use the app, then we agree.
So, now we are seeing consumers getting the choice to push back.
Apple
Now, with iOS15, Apple are saying that you will get to see what apps are accessing your data. You will be able to see when an app used that permission, and there it was sent to. Whether that list of third party sites is any use or not is meaningful is unclear.
Not quite as advanced but following quickly behind is Google Android. With Android 12, you will have the option to de-personalise your data. They will still track usage, but won’t link it back to you.
Is there any truth to the rumour that your phone or TV is listening to you, and presented content based on private conversations it overhears?
Given how poor the voice recognition is on phones , cars, or tools like Alexa or Siri, its pretty evident this can’t be reality. If it, is, then heaven only knows what it thinks it’s hearing. The voice recognition tools are getting better all the time, but there is a long way to go.
South Pacific Pictures – Case Study
"Working with Kinetics has helped us align our IT systems with the businesses need for streamlined systems and business continuity, as well as the comfort of compliance and reassurance from an industry specialist." - Kelly Martin, CEO, South Pacific Pictures...
Beware (again) – The Phishermen are after you.
The deluge of clever phishing emails continues. This one caught our eye, because it looks so authentic. Given that we look after Office 365 for this customer, it left us wondering how we'd have missed 'verifying' their account. Well, only a for a moment! When we...
Clever iOS app scams
[header2 text="Scammers are getting smarter" align="left" color="#336A40" margintop=""] You could be forgiven for being overconfident about Apple's vetting of iOS apps. But you shouldn't be lulled into thinking that all iOS apps are safe - here is an example of an...
FAKE Microsoft 365 Renewal
Another day, another scam. One of our clients forwarded this little number to us today You can see that the link to 'microsoft' is spelt wrong, with one letter missing. If you are busy, you might miss it, and by telling you your email access is about to be...
The Spectre of a Meltdown
The Spectre of a Meltdown - 2018 starts with a security headache. Unhappily, our New Year starts by warning you about yet more security vulnerabilities. Whoever names these must have a lot of fun! Spectre and Meltdown are the latest, and these two effect virtually...
Christmas 2017
Its Christmas time again and the signs are its going to be great summer. No matter how good the weather is, we know that many of us need to keep in touch with our clients and our business. [header2 text="Our Hours" align="left" color="#3ec940" margintop=""] Kinetics...
4 Reasons IT training SUCKS!
[header2 text="1. Theory with no relevance" align="left" color="#336A40" margintop=""] No matter how amazing a training course is, how effective the trainer is and how much was learnt on the day, if the learning isn't applied back at your desk, you quickly...
KRACK Wireless Access Vulnerability
[header2 text="KRACK - Wireless Access Vulnerability" align="left" color="#336A40" margintop=""] It’s been all over the news that the dastardly hackers have struck again, this time hitting your favourite wireless. According to some reports, the world will end...
Another Scammer example
[header2 text="Not the worst we've seen, but equally effective" align="left" color="#336A40" margintop=""] The scammers never stop. This latest attempt is extremely poorly written. But when you follow the link it's a passable representation of the Office 365...
Giving clients better response times
[header2 text="Speeding up our service" align="left" color="#336A40" margintop=""] To speed up our service, we’ve introduced a new ‘ticket’ (job) logging system. This is in additional option to ringing us or emailing our ‘support’ email team. Each of these systems...





