Zscaler: iOS apps leak more user data than Android apps

Zscaler: iOS apps leak more user data than Android apps

By analyzing the transaction status of devices protected by its own security products, Zscaler found that iOS applications leaked more user privacy information than Android apps. People often think that iOS is more secure than Android, but according to data detected by Zscaler from 45 million transactions last quarter, it was found that about 200,000 of them involved the leakage of user data by apps, including PII-level personal identity information (such as mobile phone numbers and email addresses), geographic location information (latitude and longitude coordinates), device metadata (IMEI code/MAC address/IMSI code/network/operating system/SIM card information/manufacturer), etc.

Zscaler said it tracked 26 million transactions from iOS devices (and iOS apps), and that 0.5% of user data was exposed, or 130,000 operations.

Of the leaked data, 72.3% was related to the user’s device information, 27.5% was geolocation coordinates, and only 0.2% was PII data exposed by the app.

Of all the cases of leaking user privacy data, 70% can be traced back to iOS devices in China, 20% are from South Africa, and the UK, US and Ireland make up the top five.

By comparison, Zscaler tracked 20 million transactions from Android apps, of which only 0.3% leaked user information (about 60,000).

Of the data leaked on the Android platform, 58% was device metadata, 39.3% was geolocation coordinates, and 3% was PII data. The largest number of Android device user information leaks occurred in the United States (55%), followed by the United Kingdom (16%) and China (12%).

The problem with user data leakage is the potential long-term threat. Over time, malicious actors can collect a large amount of information to pave the way for subsequent targeted attacks (such as phishing, SMS fraud, or denial of service/DoS attacks).

<<:  Common reverse engineering tools and usage tips for Android App

>>:  APM from entry to abandonment: Analysis of availability monitoring system and optimization methods

Recommend

Three years of 5G operations: Learning from Asia’s success stories

The 5G market is currently in an extraordinary gr...

What did Cook say to Apple China employees before accepting media interviews?

[[121596]] What did Cook say to Apple China emplo...

Data analysis practice: If I do data analysis for shared bicycle products

Many people are asking: How to improve data analy...

A green alternative to plastic → breathable and waterproof paper "armor"!

Imagine if you could put a soft and waterproof &q...

Be aware that feeling tired for no reason may be a sign of illness!

Some people are full of energy every day, while o...

If you pick this kind of grass on the roadside, you may go to jail!

The birds that are often seen, the turtles that m...

Hackers may use USB to carry out new network attacks

Hackers can use USB devices such as mice, keyboard...

Xplay 3S battery life test results released

Recently, vivo officially released a battery life ...