Feeds

Your mom, girlf, boyf: Spying on your phone and email

If you don't call them that you're probably safe

Beginner's guide to SSL certificates

Three in five parents snoop on their teenager's email and calling habits, but teenagers themselves are almost as guilty of checking out the communications history of their partners.

The survey was conducted by online store Retrevo, which reports that almost half of those under 25 admit to examining their partner's devices when the partner is out of the room. Older couples aren't quite so intrusive, with only about 30 per cent admitting to illicit snooping, but that's probably 'cos they can't work out how to use their own phones, let alone someone else's.

This isn't the kind of high-tech snooping in which Google and Facebook engage, this is just glancing at the recently called list while fiddling with the handset, or opening up the email client on a partner's laptop – perhaps the modern equivalent of checking for lipstick on the collar. But if Retrevo is to be believed, then it is pretty commonplace and increasing annually.

In 2011, 37 per cent of parents admitted checking out their children's communications (for their own good, of course), and more than half of parents surveyed would happily plant GPS tracking kit on their child without telling them. Mothers are slightly more eager to see their sprogs' every move than fathers, 64 per cent compared to 53 per cent.

The sample was only 1,000 (self-selected) people, and the company is American, so no immediate panic. But it is worrying that 14 per cent of those parents reckon their illicit interception has discovered something about their teenage offspring "that they were concerned about".

Teenagers who do nothing to concern their parents are hardly teenagers at all, and blissful ignorance has a lot going for it, but it seems that with the tools at our disposal we can't resist knowing everything about those closest to us. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?