November 6, 2015 By Shane Schick 2 min read

Nearly three-quarters of Android apps and close to half of iOS apps are inappropriately sharing smartphone users’ personal information, according to a joint study from MIT, Carnegie Mellon and Harvard.

Who Knows What About Me? A Survey of Behind-the-Scenes Personal Data Sharing to Third Parties by Mobile Apps” is a pretty damning indictment of the way developers handle the personal information they get when users download their products. In a random look at 55 apps across both platforms, for example, the study found 47 percent of iOS apps share location data about the iPhone customers, while a staggering 73 percent of Android apps offer email addresses without explicit consent.

Although it’s unlikely many of these apps are offering personal information to cybercriminals, the study shows an apparent lack of accountability in how data moves from one organization to another. As BusinessInsider reported, many of the details seem innocuous enough, such as the iOS version of Instagram sending birthday, gender and location to Apple. In 3 out of 10 medical, health and fitness apps, however, what’s being collected includes in-app search histories for medical terms.

To prove how much spying is going on within mobile apps, the researchers tracked HTTP and HTTPS traffic and then identified personal information that went to third-party domains, according to BBC News. In some cases, the results were mysterious, such as the fact that 93 percent of Android apps covered in the study connected to Safemovedm.com. Privacy International told BBC the report documented a betrayal of smartphone users’ trust and raised questions about possible future data retention legislation.

Although neither Google nor Apple responded to requests from several outlets for comment, it’s not as though they’re unaware of the potential fallout. Just a few weeks ago, for example, a story on Ars Technica said Apple had pulled more than 250 iOS apps from its App Store for violating its privacy policy and collecting personal information from private APIs.

Apple, of course, has been making its approach to privacy a centerpiece of its strategy, with an in-depth policy update earlier this year. As this research proves, however, the problem may be one of mobile OS providers coaching developers on the boundaries for data sharing — and providing more enforcement when necessary.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today