The security scientists were able to find the unsecured cloud databases from 13 apps, meaning outsider stars can also access them.Other apps have poorly set up push notification managers, which hackers might utilize to obstruct and customize seemingly genuine notices from the designers, seeding them with malware, phishing links, or misleading content.These vulnerabilities put at least 100 million Android users at danger of fraud, identity theft, and malware attacks.What Android apps are putting your information at risk?Check Point Research states it found one or more of these flaws in 23 apps, 13 of which had openly available real-time databases. The report revealed it saves account passwords on the exact same cloud service that saves the recordings the app makes, leaving them vulnerable.TLeva: A taxi-hailing app from Angola with more than 50,000 downloads, this one leaves text history between riders and motorists, location information, full names, and phone numbers accessible.Check Point states it alerted the app developers, but only Astro Guru responded, and all of the apps are still readily available on Google Play.What should Android users do to keep their information safe?The very first action is to stop using the of the apps called out in Check Point Researchs report– however given that just 5 are called, that implies there are at least 18 others out there keeping your data without the correct safeguards.And thats simply what we know of from Check Points report– there are likely far more apps, sites, and services with misconfigured databases that well never know about until after a leak.While Check Point Researchs report and others like it can inform developers to insecure information storage practices, its ultimately up to the developers to fix the concern. Users can take preventative procedure to keep their individual info and other crucial data safe, no matter what apps theyre using: Use two-factor authentication (2FA) whenever possible.Withhold personal information from your accounts (dont add your home address if a service does not need it, for circumstances), or utilize phony information whenever possible.Create special passwords for every account and use an encrypted password manager.Do not connect third-party accounts like Google, Facebook, and Twitter if you can prevent it.Keep app authorizations to the bare minimum.Use services that alert you of breaches and compromised accounts.These extra steps wont stop a breach, however they can reduce your threat of identity theft, scams, and other rip-offs.

Leave a Reply

Your email address will not be published. Required fields are marked *