You're REALLY doing it wrong!

25% of people will text during sex and 15% will answer a call during sex. What if your cell was listening via the microphone and watching via the camera because it's handy and can be made into a covert listening device? Then there's malware that turns your phone, or your laptop web cam, into a spy stealing your privacy...

Did you know, the world sends 3.5 million texts per minute?! No one forces us to carry smartphones with us at all times, but they are pocket spies so it’s no wonder why mobile phone tracking is the preferred surveillance of choice. The ACLU warned, "Of all of the recent technological developments that have expanded the surveillance capabilities of law enforcement agencies at the expense of individual privacy, perhaps the most powerful is cell phone location tracking." And the cell phone companies rake in the big bucks by selling historical cell site location data. A new infographic got me to thinking; it’s called Cellular Jerks: Where are you mobile manners?

“The average person talks three times louder on a cell phone” and have made 55% of people uncomfortable to overhear a personal call. Sometimes I see things slightly different than it was meant to be seen. These habits and stats may make a person a cellular jerk, but from a security perspective, eavesdropping on such mobile habits make social engineering so easy even a preschooler can do it.

Neither of these are wisdom, but:

Mobile privacy is a bit of an oxymoron as it is, but also from a privacy perspective it's about to get gross and we are working our way to really creepy.

Stop for minute and think about this. What if your cell was listening via the microphone and watching via the camera because it's handy and can be made into a covert listening device? Way back in 2006, the FBI began tapping cell phone mics for eavesdropping purposes. It's not just the government potentially listening either, since a plethora of spying software is sold to jealous spouses and significant others every year. Some folks find it James Bond cool, while others think it's more like a cyberstalking tool. You remember the espionage malware Flame that took advantage of Windows and spoofed Microsoft security certificates? Bluetooth capabilities are also not always your friend and as Ars reported, malware has allowed attackers to physically stalk victims; "Flame attackers could even surveil smartphones not infected by the malware."

With that in mind, not only would this make you a cellular jerk, but anyone who does this is most assuredly doing it wrong!

Unless you are really into voyeurism, the fact that your mobile device could be spying on you during such intimate times probably doesn't really turn you on. Or maybe so? It takes all kinds. But if you hadn't thought about how else your cell phone could be used to spy on you, then have you stopped to consider the same scenario but in regard to your laptop? Do you leave it open? Hmmm, do you really believe your web cam is only on if you see the light that shows it is recording? A recent study found that 1 in 2 Americans are clueless about web cam hacking.

Someone could be watching . . . and this video 'Webcam' does any excellent job of showing that. It's "based on actual events and was shot entirely on a computer's webcam. The filmmakers hope that it will make people think more about the technology that we use every day and the effects it can have on all of us." Can't happen? Think again before you scoff. HOW TO: Spy on the Webcams of Your Website Visitors, a vulnerability in Adobe Flash, made it to Jeremiah Grossman's top hacking techniques of 2011. That was no sooner "fixed" before another was revealed as "Adobe Flash Webcam clickjacking - The security fix that wasn't and the hole that was."

Cover your webcam with a piece of tape, a Post-it note, or buy a cover. While "don't be a cellular jerk" and "Wow, you are really doing it wrong," were more the points to the graphic, I sometimes see things in different shades of privacy and security shades of gray.

Infographic Credit:

Like this? Here's more posts:

Follow me on Twitter @PrivacyFanatic

Copyright © 2012 IDG Communications, Inc.

Microsoft's very bad year for security: A timeline