It’s pretty simple: Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various applications allow you to “check in” using your mobile and share your whereabouts with the world. These applications tap into your device’s GPS longitude and latitude data.
GPS certainly can be useful, such as with directions or when trying to find a local restaurant, but letting the world know where you are and where you aren’t every minute of the day is a little insane to me.
For example, when your location is broadcast on social networks, anyone can see it. An example is when you check into a hotel while on vacation. Thieves can see you’re not home, do an online search for your home address and burgle your house. Not cool.
Adults, teens and some kids use these services to meet up, but what could happen if your child’s exact location fell into the wrong hands? Parents now have to be particularly vigilant if their children use location-based services.
Freaky stalkers use GPS to track their victims. A stalker may not necessarily be a stranger but instead a family member, ex-boyfriend or ex-girlfriend using his or her personal access to manually turn on GPS tracking.
Always be aware of an application’s policy and access permissions. GPS data is also used in geotagging, which tracks exactly where photos and videos are taken by including data in the image file that records locations.
Many of us are unaware of this tracking feature, even though sharing images online has become immensely popular. Websites such as Facebook, Instagram, Flickr and YouTube are filled with pictures and videos that include location information. Always keep in mind this is personal information that you may be sharing inadvertently.
By using a VPN (virtual private network) appsuch as Hotspot Shield VPN, your mobile’s IP address is masked; this confuses some of the functionality in geotagging. So if you’re going to go without it, think before you turn on GPS and start snapping pictures to post.
Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Don’t Let Location-Based Services Put You in Danger
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can be used on
- Geo-tagging: Is Your Smartphone Revealing Your Location?
Location-based services utilize geo-location information tied to your phones GPS and in some cases your carriers connection and even WiFi Geo-location or geo-tagging can be used on PCs, but is primarily applicable to mobile phones. The geo-location software usually obtains its data from your device’s Internet protocol (IP) address or your global positioning System (GPS) longitude and latitude.
- How Does My IP Address Affect Different Services?
You’ve probably heard the term IP address before but you likely aren’t fully aware of all the ways it is used. Or misused by various entities. Or how you can turn an IP address to your own advantage by taking control of who gets to use it. An internet protocol (IP) address is a numerical label
- How to see and boot off Someone using your WiFi
You were taught to share your toys as a young child, but this doesn’t apply to letting others use your Wi-Fi. The difference between sharing the plastic shovel and sharing the wireless connection is that with the latter, who’s to say that the “thief” won’t eventually crash in on your private information? And don’t forget
- Steps to Take When Connecting to WiFi at the Coffee Shop
Consumers are oblivious to the dangers of connecting in a free wireless environment. If they actually knew how vulnerable they are, all that coffee shops would do is sell coffee.Nobody would stick around and connect to the internet. Everyone—and I mean everyone—always asks me if they should connect to public WiFi. The short answer is yes,