Take Control Over Your Business & Personal Information By Joining The Privacy COOP!

My Smart Privacy
  • Home
  • Threat Landscape
  • MSP News
  • MSP Events
  • Privacy CO-OP
  • About
  • More
    • Home
    • Threat Landscape
    • MSP News
    • MSP Events
    • Privacy CO-OP
    • About
My Smart Privacy
  • Home
  • Threat Landscape
  • MSP News
  • MSP Events
  • Privacy CO-OP
  • About

Device & End Point Cybersecurity Threats!

The Android OS, Apple iOS, & Microsoft Windows OS Support Intrusive Apps!

   Apps are the biggest threat to connected devices supported by the Android OS, Apple iOS, and Microsoft Windows 8, 10, & 11 OS due to the fact that apps today are intentionally designed to be intrusive, addictive, and manipulative posing numerous threats to the end user, plus end user business, employment, and personal information.  


At risk are devices that include:


  • Smartphones
  • Tablet PCs
  • Connected Vehicles
  • IoT/IIoT Devices
  • PCs
  • Connected Products
  • Connected Appliances

Surveillance & Data Mining Apps: "Legal Malware"!

Threat Landscape: Confidential Business & Personal Information!

  Intrusive apps can be classified as "Legal Malware", supported by exploitive terms of use that include:


  • Online Terms & Conditions
  • Online Privacy Policies
  • Online End User Licensing Agreements (EULAs)
  • Hidden (In-device) Application Permissions & Product Warnings


The predatory terms of use can include up to 3,000 pages of complicated legalese enabling the app developer, including those from China and Russia, to lawfully conduct surveillance on the end user data mining over 5,000 highly confidential data points associated with the end user's confidential business and personal information that includes:

  • Text, SMS, Instant, & Social Media Messages
  • Contact Address Book
  • Email & Email Attachments
  • Account Information (Business, Medical, Banking, Social Media, etc.)
  • Calendar Events
  • Location Information
  • Motion Data
  • Biometric Data
  • Photos & Videos
  • Audio/Video Recordings of the End User
  • And The List Goes On....

Business & Government Cybersecurity Threats!

Google, Apple, & Microsoft Distribute Surveillance & Data Mining Apps!

     Governments, corporations, small businesses, and individuals are investing billions of dollars into network cybersecurity while not realizing huge threats posed by intrusive app & platform developers, including those from China and Russia.


This means that Google, Apple, & Microsoft are actively distributing surveillance & data mining technology in the form of intrusive apps.  


Intrusive App Developers Include:


  • Alphabet (Google)
  • Apple
  • Microsoft
  • Amazon
  • JD.Com (Main Investor is Walmart- China)
  • Meta (Facebook)
  • Twitter
  • ByteDance (TikTok- China)
  • Tencent (WeChat-China)
  • Baidu (Android App Developer- China)
  • Prisma Labs (Android App Developer- China)
  • And The List Goes On...

Doing Business With Your Competitors & Adversaries!

The Threat Landscape: Competition, Innovation, Cybersecurity, Privacy, & National Security!

Business executives, board members, and government officials need to realize that many multinational app & platform developers, including those from China and Russia, compete in many industries worldwide posing massive threats to:

 

  • Competition
  • Innovation
  • Cybersecurity
  • Network Security
  • Critical Infrastructure
  • End User Privacy
  • Confidential Personal & Business Information
  • End User Safety
  • Intellectual Property (IP)
  • National Security


Companies, governments, hospitals, legal firms, academic institutions, and medical professionals using intrusive apps are inadvertently exposing highly confidential and protected information, including IP, to existing and future business competitors, including those from adversarial countries such as China & Russia.

 

Confidential and protected information includes information protected/regulated by:

  

  • Employment Agreements
  • Nondisclosure Agreements (NDAs)
  • Business Legal Agreements (MSAs, Proposals, Etc.)
  • Government & Federal Cybersecurity Standards
  • Federal Information Protection Standards (FIPS)
  • Legal Information Protected by Client Attorney Privilege
  • Medical Information Protected by HIPPA & HL7 Data Standards
  • Classified Information

Threats To Networks & Critical Infrastructure!

The Threat Landscape: Networks, IoT/IIoT Devices, & Critical Infrastructure!

  Intrusive apps can even launch attacks on networks such as DDoS and Man-in-the Middle attacks putting networks, assets, critical infrastructure, and people at risk.

Hybrid Warfare: Every Business & Person Is A Target!

The Threat Landscape: Govt./Elected Officials, Board Members, C-Suite Executives, & Employees!

  How Much of Your Business & Personal Information is on Chinese & Russian Servers?


Google, Apple, & Microsoft are distributing Chinese & Russian surveillance and data mining technology in the form of apps and platforms that are preinstalled into:

 

  • Smartphones
  • Tablet PCs
  • Connected Vehicles
  • IoT/IIoT Devices
  • PCs
  • Connected Products
  • Connected Appliances


Billions of connected product users have no idea how many of the apps and platforms that support their devices are developed by Chinese and Russian companies who develop addictive, intrusive, and manipulative apps & platforms such as:


  • TikTok (ByteDance- China)
  • Baidu Apps (Android App Developer/Google Partner-China)
  • Prisma Labs (Android App Developer- Russia)
  • WeChat (Tencent- China) 
  • And The List Goes On...


These intrusive apps and platforms are distributed by Google, Apple, & Microsoft enable companies from China and Russia to monitor, track, and data mining the Android OS, Apple iOS, and Microsoft Windows OS end user for financial gain 24x7/365 days per year whether the end user is an:


  • Adult, Teen, or Child
  • Professional- Doctor, Attorney, Judge, Journalist, etc.
  • Govt./Elected Official
  • Member of the Military or Law Enforcement
  • Business Leader or Business End User
  • And The List Goes On...


How protected is your business, government agency, or organization from hybrid warfare?

Addictive, Manipulative, Exploitive, & Dangerous Apps!

The Threat Landscape: End User Privacy, Safety, & Productivity!

According to former executives & product developers for Google & Facebook*, apps are intentionally designed to be highly addictive and manipulative posing massive safety threats to the end user whether the end users is an adult, teen, child, or business professional.

  

App developers use highly addictive “Brain Hijacking” technology associated with suggestive and manipulative advertising technologies that are designed to make sure that end users spend maximum time on social media platforms so that the app developer can exploit the end user for financial gain as admitted by numerous tech industry professionals and executives*.

   

Due to highly addictive apps designed to provide the end user with a "social validation feedback loop", many business users of connected products are becoming unproductive during work hours while having the urge to constantly check social media feeds costing businesses billions of dollars in lost productivity annually.


*Reference the Netflix documentaries the Great Hack & The Social Dilemma.   

contact rex m. lee for more information!

Rex M. Lee- Cybersecurity & Privacy Advisor/Tech Journalist

Email: RLee@MySmartPrivacy.com

Phone: (210) 639-6035

Copyright © 2022 RML Business Consulting, LLC  - All Rights Reserved.

  • Home
  • Threat Landscape
  • MSP News
  • MSP Events
  • Privacy CO-OP
  • About