Zscaler: iOS apps leak more user data than Android apps

Zscaler: iOS apps leak more user data than Android apps

By analyzing the transaction status of devices protected by its own security products, Zscaler found that iOS applications leaked more user privacy information than Android apps. People often think that iOS is more secure than Android, but according to data detected by Zscaler from 45 million transactions last quarter, it was found that about 200,000 of them involved the leakage of user data by apps, including PII-level personal identity information (such as mobile phone numbers and email addresses), geographic location information (latitude and longitude coordinates), device metadata (IMEI code/MAC address/IMSI code/network/operating system/SIM card information/manufacturer), etc.

Zscaler said it tracked 26 million transactions from iOS devices (and iOS apps), and that 0.5% of user data was exposed, or 130,000 operations.

Of the leaked data, 72.3% was related to the user’s device information, 27.5% was geolocation coordinates, and only 0.2% was PII data exposed by the app.

Of all the cases of leaking user privacy data, 70% can be traced back to iOS devices in China, 20% are from South Africa, and the UK, US and Ireland make up the top five.

By comparison, Zscaler tracked 20 million transactions from Android apps, of which only 0.3% leaked user information (about 60,000).

Of the data leaked on the Android platform, 58% was device metadata, 39.3% was geolocation coordinates, and 3% was PII data. The largest number of Android device user information leaks occurred in the United States (55%), followed by the United Kingdom (16%) and China (12%).

The problem with user data leakage is the potential long-term threat. Over time, malicious actors can collect a large amount of information to pave the way for subsequent targeted attacks (such as phishing, SMS fraud, or denial of service/DoS attacks).

<<:  Common reverse engineering tools and usage tips for Android App

>>:  APM from entry to abandonment: Analysis of availability monitoring system and optimization methods

Recommend

6 Psychological Effects You Must Know About Marketing

In recent years, various content forms have becom...

Community operation from 0 to 1500+, the 5 key words I summarized

Some people say that a community is a net woven b...

The Four Color Theorem: A New-Age Algorithm for the Classical Coloring Problem

You must have heard of the Four Color Theorem, wh...

Is Apple going backwards by changing its computer chips?

Apple uses its own AMR architecture chips in its ...

Tu Mi Character Design Issue 2 2021 [Good quality with courseware]

Tu Mi Character Design Issue 2 2021 [Good quality...

Android is not secure, Google is not clear

The twenty-six letters of the alphabet have all b...

Which platform is suitable for the wedding photography industry?

"Who doesn't take wedding photos when th...

Can eating chili peppers speed up the recovery of oral ulcers?

Recently, some netizens claimed that if you want ...

How to plan brand marketing for the Chinese Valentine’s Day?

As a traditional festival, couples are busy getti...

How to collect data more valuable and analyze data efficiently?

Last time we talked about the significance and va...