- Targeted social engineering attacks that employ real-time or historical geolocation data. For example, an employee at a leading tech/pharma/defense contractor reveals, via Foursquare, his or her regular visits to the local coffee shop, where s/he is targeted by social engineers looking to gain access to the corporate network, or the victim of a real-world theft (laptop, mobile device) that yields sensitive data.
- Stalkers, estranged spouses/lovers monitor check-in services and use them to confront the object of their obsession. Expect to see these kinds of services popping up in court proceedings, as Facebook recently has.
- Malware that leverages preference data from check-in services to social engineer targets
- Malicious hackers use location data to launch real-time attacks against other check-in service users.
These days certain industry leaders like to proclaim that privacy is an outdated concept. But criminal abuse of location services to pursue people, not just their data, may give privacy advocates the most potent ammunition they've had in years.
This article, "Location services: The security implications of oversharing," was originally published at InfoWorld.com. Get the first word on what the important tech news really means with the InfoWorld Tech Watch blog.