Zscaler: iOS apps leak more user data than Android apps

Zscaler: iOS apps leak more user data than Android apps

By analyzing the transaction status of devices protected by its own security products, Zscaler found that iOS applications leaked more user privacy information than Android apps. People often think that iOS is more secure than Android, but according to data detected by Zscaler from 45 million transactions last quarter, it was found that about 200,000 of them involved the leakage of user data by apps, including PII-level personal identity information (such as mobile phone numbers and email addresses), geographic location information (latitude and longitude coordinates), device metadata (IMEI code/MAC address/IMSI code/network/operating system/SIM card information/manufacturer), etc.

Zscaler said it tracked 26 million transactions from iOS devices (and iOS apps), and that 0.5% of user data was exposed, or 130,000 operations.

Of the leaked data, 72.3% was related to the user’s device information, 27.5% was geolocation coordinates, and only 0.2% was PII data exposed by the app.

Of all the cases of leaking user privacy data, 70% can be traced back to iOS devices in China, 20% are from South Africa, and the UK, US and Ireland make up the top five.

By comparison, Zscaler tracked 20 million transactions from Android apps, of which only 0.3% leaked user information (about 60,000).

Of the data leaked on the Android platform, 58% was device metadata, 39.3% was geolocation coordinates, and 3% was PII data. The largest number of Android device user information leaks occurred in the United States (55%), followed by the United Kingdom (16%) and China (12%).

The problem with user data leakage is the potential long-term threat. Over time, malicious actors can collect a large amount of information to pave the way for subsequent targeted attacks (such as phishing, SMS fraud, or denial of service/DoS attacks).

<<:  Common reverse engineering tools and usage tips for Android App

>>:  APM from entry to abandonment: Analysis of availability monitoring system and optimization methods

Recommend

IQIYI's Ma Dong: Pirated video websites are doomed to fail

On September 16, at the International Copyright F...

User operation strategy plan

The article divides Someet users into a pyramid m...

New Media Operation: How to write a 10w+ title?

I look at the 10w+ titles and don’t know how to a...

Will 5G phones turn back to 4G? Possibly

At the press conference of the State Council Info...

Review of the operation of Xiaohongshu’s popular community!

I had nothing to do during the recent epidemic, s...

How many of these 15 exclusive riddles for programmers can you guess?

[[135031]] 1. Late night visit 2. Win six games i...

How to conduct a fission activity correctly?

This article analyzes the disadvantages of blindl...