[ad_1]
Data theft is becoming more common due to modern technology. There are three types of data theft: pod slurping, bluesnarfing, and sneakernet. Pod slurping uses iPod-like devices to download data, while bluesnarfing steals data via Bluetooth connections. Sneakernet involves transferring data via removable storage devices. All three methods can hold large amounts of data and can be used to steal private information.
Data theft is not a new event but it is happening more frequently due to the ease of data theft with modern technology. There are several types of data theft, including pod slurping, bluesnarfing, and sneakernet, which use different methods to obtain data. Pod slurping is the act of using an iPod® or iPod®-like device to download and fetch data from a computer. Bluesnarfing is the act of stealing data from another Bluetooth®-enabled mobile phone, laptop or other electronic device by connecting to it with a Bluetooth® connection. Sneakernet is a method of transferring data from one computer to another using USB flash drives, compact discs (CDs), or other forms of removable storage.
With pod slurping, a data thief is only limited by the capability of the device he or she is using to steal data. As technology advances, these devices are getting physically smaller but are capable of holding more. In fact, while these devices are normally music players meant to hold anywhere from a few hundred to a couple thousand songs, they can be filled with enough illicit data to potentially ruin a business. It’s usually not immediately obvious that someone is drinking pods because people are constantly plugging music devices like iPod® into computers to charge them, listen to music, or put music on them.
Data theft through Bluesnarfing is a very limited method, but it can still capture private data such as address books, photos and videos. For Bluesnarf, both the thief’s and victim’s devices must be Bluetooth® enabled. The victim’s device must be set to discoverable instead of hidden, and must be within range of the thief. Once everything is in place, the thief can start copying data from the victim’s device to his own device. This type of data theft is illegal in some countries because it violates privacy laws.
Sneaknet is perhaps the most common method used for data theft. The term sneakernet is not only used to describe data theft, but for any type of file sharing via removable storage devices such as USB flash drives. Like music devices, portable storage devices are designed to be physically smaller but can hold more data than ever before. This makes it easier for thieves to steal work-to-home data, which is a growing problem in many workplaces around the world. It is especially common when an employee quits or is fired.
[ad_2]