Privacy Concerns Regarding Ride sharing Apps

In places across the world, making use of car-pooling apps has become prevalent. Similar to how Google has become a household name, Uber and Lyft have earned their space in the lives of most people.

The advantage of perpetually accessible cabs and cabbies joined with user-friendly applications, along with a variety of transportation and pricing alternatives offers a large combination of technology and transit. But, as these services need passengers’ information, like their real-time location and payment methods, they may potentially put the passengers’ data and security in danger if the data gets abused.

Privacy Concerns Regarding Ridesharing Apps

Ride Share Apps: Boon or Bane?

Conventional automobile services such as cabs have declined in popularity mostly since ridesharing services extend significant benefits: instant approval of trip requests, affordable charges, and generally a current and more diverse “fleet” of automobiles because they hire individual drivers who work with their own automobiles.

Despite their widespread popularity, carpooling services come with their own set of problems, as they operate without regulation. But, it is still within the company’s scope to determine how to handle background checks for candidates or what kind of insurance is required. Fortunately, there is a human “safety check” method that a majority of cab pooling services employ. Every passenger can rate their driver, and the driver can evaluate the customers in a similar way. When a driver drops under a particular rating, they are not able to work for the service.

What kind of information do ridesharing systems collect?

To book a ride from peer-to-peer ridesharing companies such as Ola, Uber, and Lyft, users need a smartphone with GPS so that the location of drivers and potential passengers can be tracked. But, if the passenger does not disable GPS tracking even when their ride has ended, the applications are capable of monitoring and collecting information 24/7 on the passenger’s real-time location.

Apart from tracking and storing location, some ridesharing companies need the potential passengers to link to their social networking account, such as Facebook, in order to verify their identities. In such cases, people allow these services to access their personal data present in their social media accounts.

Since ridesharing companies allow users to go cashless, people need to save their bank card credentials in their ridesharing apps.

What are the security and privacy threats?

Once upon a time, a ridesharing firm threw a party in a different town where they presented in real-time the complete names and destinations of their customers. Fortunately, nothing except a bit of intense fury from the media arose from the privacy indiscretion. However, it raised the problem of how the ridesharing businesses save, manage and also protect the privacy of their customers.

Irrespective of what kind of service is offered by a firm, one should always carefully go through their privacy policy. A well-made privacy policy will explicitly mention the information the company plans to access, store, and transfer to 3rd parties.

Conclusion

Before downloading a ride sharing application and registering for its services, you must go through the app reviews. Check the reviews that are poorly rated, and see if other users have raised any privacy concerns.

About us :

Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup.

How to Set Up a New Phone to Protect it Against Threats

Did you just get a new phone? Congratulations! Well, before you get all excited and start using it, you must take steps to make it secure. With so many threats lurking around every corner, you should take preventive and precautionary measures. Here are some tips for setting up your new phone to protect it against threats:

  1. Safely transfer the data from the old phone

In all likelihood, when you buy a brand new mobile or tab, you will wish to move the data from your old phone to the new one. And for that, you will have to copy the data in the older phone. Now, transferring data can be a bit more complicated for handheld devices, since frequently users purchase a different phone than their older one. It might seem challenging to move data when your new phone is different from your previous possession. Transferring files and apps is a time-consuming process. You should do it carefully so that you do not miss something out.

  1. Install operating system updates

There might be a significant time gap between the manufacture and sale of phones. Therefore, the operating system may be outdated. When you buy a new phone, install any available operating system updates. System updates may consume significant data. Hence it is recommended to install updates over Wi-Fi.

  1. Add password protection

Pocket-sized devices should always be kept locked with a password. While adding passcodes, fingerprint, password, etc., to unlock the screen may seem inconvenient, it is crucial for security and privacy purposes. You can add multi-factor authentication to make your phone more secure.

  1. Get security protection

Everybody knows how important it is to have an anti-malware program on desktop computers and laptops. There are various sorts of malware threats, and one needs to secure their devices against them. You need to install an anti-malware software on your phone or tab as these devices are exposed to malware threats. You can unknowingly download a malicious application from the app store. Therefore, invest in a reliable anti-malware for your phone.

  1. Do not download from 3rd party app stores

When downloading applications, it is crucial to verify them. 3rd party app stores contain malicious applications. Even though some apps are authentic and safe, many of them are injected with a malicious code. Therefore, iPhone and iPad users should install applications from the Apple App Store and Android users from Google Play Store.

  1. Turn off Bluetooth

When you are at a public place, turn off Bluetooth. To be safer, keep the Bluetooth disabled when you are not using it. By turning off Bluetooth, you are giving hackers a way to enter your device. Therefore, to make yourself less vulnerable to digital threats, turn on Bluetooth only when absolutely necessary. =

  1. Get a sturdy phone case

Investing in a good quality cover for your phone will protect it from physical damage. The days of bulky and iron-strong Nokia phones are long gone. Presently, phones are much slimmer and sleeker. Therefore you must invest in a proper case which adds bulk to the phone. Phone cases cushion the phone and save it from damage when the phone falls down.

About us :

Mir Ariif is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup