>

Does software companies collect data in devices?

It is not necessary to know the software companies that are stealing your data. It is also not fair to blame only Facebook, Twitter and WhatsApp for stealing data for business continuity or to give better services by understanding the user’s behaviour. The fact is they would be required to understand your behaviour and only then can they suggest the best. Like through machine learning, machine is learning us, our behaviour and attitude.

Internet of Things (IoT) and artificial Intelligence (AI) are the two tools for companies in data capture and analysis that help them better understand day-to-day operations, make business decisions and learn about their customers. Today every software company, including Microsoft, Google, Apple and Amazonare developing their products based on AI. Another interesting thing is that by the power of a simple, antivirus software, which is a software program that spreads from one computer to another and interferes with computer operation,the computer virus could corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk.Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download.

Every person has different level of privacy and it doesn’t have any definition; it will vary from person to person. Privacy is the biggest concern with every individual who are exposed to the internet and even opening of an email address. We do not have privacy anymore. Sadly, many companies are collecting data from us, and we cannot do anything to stop them. Now even few antivirus companies are collecting our data and selling it to make more money.

Even Microsoft website says –“Windows 10 delivers comprehensive, built-in and ongoing security protections that you can trust – including Windows Defender anti-virus, firewall and more. By staying up to date, you are assured of the latest features and protection – at no extra cost to you.”

Spyware is an industry wide challenge, and it is encouraging to see Microsoft take strong action to protect Windows users.

It further says, “Windows customers will benefit from our anti-spyware technology, which puts the control of software back into the hands of users where it belongs that includes data vital to the operation of Windows. We use this data to help keep Windows and apps secure, up-to-date, and running properly. This option also includes basic error reporting back to Microsoft.”
Antivirus programs need to be constantly updated for virus definitions. Having an outdated antivirus software is as good as not having any. Antivirus software scans all the files that you open from the back-end by comparing specific bits of code against information in its database and if it finds a pattern duplicating one in the databasethat is considered a virus, it will quarantine or delete that particular file for safeguarding the computer from threats and other malicious attacks.

Having said this, could we stop the propagation of IPV4 address and the accessibility to TCP/IP protocol for any external or third party application except the native applications? Whereas, other applications should utilise HTTP, HTTPS,SOAP and FTP protocol for their execution without/with a permission to specific port only,no admin/system control should be provided to any third party application itself, except the NETWORK permission. n