Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk

Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they are notoriously hard to trust.
In an age when technology is constantly evolving, it is almost impossible to tell if a certain app is tracking the user at face value, and no security measures are foolproof since technology is constantly evolving.
Even though the app behaves well today if the company behind the app is sold, the direction of the company changes, or if a flaw results in the app becoming compromised, the app could become a bad actor tomorrow.
Having said that, the sheer number of mobile apps is dizzying, as are their privacy policies; however, smartphone apps are joyous, laugh-inducing, and sometimes even catch the attention of the world due to their viral nature.
A new privacy setting on Android and iOS for Android and iOS can prevent apps from tracking users' data and will allow them to delete the data Google has saved about their data, along with ways to find and delete this data.
A user in most cases consents to sharing their information with other apps, and they enable device permissions with their consent as well.
The reason why apps require such permissions is usually for very good reason.
It is common for cloud-based apps to gain access to the camera, location, data, and contacts on the user's phone.
Users never know how much sensitive information might be intercepted by cloud-based apps.
As a consequence, if unknowingly, employees give the keys to the company's back door to hackers, fraudsters, and spies, particularly if their company naively uses the same login information for external apps as it uses for internal apps, then the company is giving these nefarious types of people the keys.
Password managers are apps that keep all your passwords in one place, encrypted, password-protected and they generate and remember strong passwords for you.
Several apps will save passwords for you, including Google Chrome and Samsung's proprietary phone app, but security experts always advise using a password manager to store passwords.
According to 46 per cent of Android apps and 25 per cent of iOS apps, camera access was the most commonly requested common risky permission.
It was followed closely by location tracking, which was requested by 45 per cent of Android apps and 25 per cent of iOS apps.
There was 25 per cent of Android apps requested the ability to record audio files, while 9 per cent did for iOS apps.
Another 15 per cent of Android apps asked for the ability to read SMS messages, as well as 10 per cent of Android apps asked for the ability to see call logs.
Explore these four trending apps that might compromise your personal information, along with valuable tips to ensure a secure experience with smartphone applications.
As is the case with Voilà AI Artist, it is unclear how the app uses users' likenesses after it takes a picture.
Users are free to share their User Content with the app as long as they are not a commercial entity.
Ensure that the user account is only visible to people the user knows in real life, and opt out of targeted ads and tracking, as well as ensure that only the app sees what users do.


This Cyber News was published on www.cysecurity.news. Publication date: Mon, 18 Dec 2023 14:28:05 +0000


Cyber News related to Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk

Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk - Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they are notoriously hard to trust. In an age when technology is constantly evolving, it is almost impossible to tell if a ...
6 months ago Cysecurity.news
Privacy Education for Students: A Vital Curriculum Component - Recognizing privacy as a fundamental right, educators are increasingly acknowledging the importance of integrating privacy education into the curriculum. This article explores the significance of privacy education for students and its role as a vital ...
6 months ago Securityzap.com
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store - On Android devices, one of the apps analyzed by researchers has more than 100,000 downloads, tracks, and shares location data with ByteDance and Amazon, etc. ChatGPT, the AI software, has already taken the Internet by storm, and that is why ...
1 year ago Hackread.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
5 months ago Securityzap.com
Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
6 months ago Feeds.dzone.com
Privacy Isn't Dead. Far From It. - EFF is one of dozens, if not hundreds, of organizations that work to protect privacy. Millions of people read EFF's website each year, and tens of millions use the tools we've made, like Privacy Badger. Privacy is one of EFF's biggest concerns, and ...
4 months ago Eff.org
Protecting Student Privacy Online - In the rapidly evolving world of online education, the protection of student privacy has emerged as a critical concern. This article delves into the privacy risks associated with online education and highlights the significance of complying with ...
6 months ago Securityzap.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
5 months ago Techtarget.com
What CISOs Need to Know About Data Privacy in 2024 - While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals need to understand the ...
5 months ago Cybersecurity-insiders.com
Building a Privacy-Centric Organization with FireMon - As organizations increasingly rely on technology to streamline operations and connect with customers, the need for robust privacy measures has become more critical than ever. Here at FireMon, we play a pivotal role in building a privacy-centric ...
5 months ago Securityboulevard.com
Enhancing Home Privacy with Technology: Your Digital Shield - In an ever-evolving world, technology has become increasingly integral to home privacy. Smart lock systems, video doorbells, motion sensors, security cameras, and automated privacy settings are some of the popular home privacy tech options available. ...
6 months ago Securityzap.com
Cyber Insecurity and Misinformation Top WEF Global Risk List - The latest World Economic Forum Global Risks Report 2024 highlighted the rising tide of cyber threats and places misinformation and disinformation as the most severe risk globally. It also warned of low-cost crime havens and issues surrounding ...
5 months ago Infosecurity-magazine.com
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
5 months ago Darkreading.com
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
5 months ago Cyberdefensemagazine.com
Transcend enhances its privacy platform to address current and future compliance challenges - Transcend announced an expansion of its product suite-going even further to help the world's best brands manage complex privacy compliance challenges. Powering privacy for Fortune 100 companies, the global 2000s, and high-growth start-ups, Transcend ...
6 months ago Helpnetsecurity.com
Halting Hackers on the Holidays 2023 Part II: The Apps You Trust - Most free flashlight apps are creepware - also known as malware that spies on you and your online behavior and could pass along information to others. The problem doesn't begin and end with flashlight apps, though. Many seemingly innocuous apps that ...
6 months ago Cyberdefensemagazine.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
6 months ago Feeds.dzone.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
5 months ago Cyberdefensemagazine.com
My Yearly Look Back, a Look Forward and a Warning - 2023 saw cybersecurity and privacy law arrive at a crossroads, especially with regard to the regulatory landscape. This is the time of year when it is traditional to look back at the past year and extrapolate forward to make predictions for the year ...
5 months ago Securityboulevard.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
5 months ago Cybersecurity-insiders.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)