Categories: Technology

Security Guide: When To Actually Deny Mobile App Permissions

When downloading new computer software, a mobile app or asking to join a new network, do you click or tap “Agree” to the permissions without having read a word of it? For all you know, you could very well have just agreed to sacrifice your first born to the technology gods.

In 2014, London-based security firm F-Secure supported an experiment called the “Herod Clause.” The experiment was meant to show that few people actually read the terms and conditions before hitting agree to connect to a wifi hotspot. To use the wifi hotspot in some of London’s most populated districts, users had to agree to give up their first born. The terms and conditions stated in plain site that users could only get access to the hotspot if “the recipient agreed to assign their first born child to [F-Secure] for the duration of eternity.” As it happens, blissfully unaware users agreed to give up their first born for free internet.

The point of the experiment according to the Cyber Security Institute was to show that people just assumed there weren’t security issues written in the contract.

How many times have you mindlessly tapped “Agree?” How frequently have software and mobile downloads asked for access to your contact list, microphone, and webcam? It seems to be the new norm, but is it safe? What are the cyber security risks that come with downloading willy-nilly?

Read Before You Click Or Tap

[pullquote]If you’re like a lot of people, you’ve probably downloaded Spotify, Facebook Messenger and Netflix on your devices. You trust the companies that run the apps, and so do your employees.[/pullquote] Unbeknownst to you, a couple of your employees may have downloaded music, video, and other media apps to the company laptops, granting complete access to the company’s contact list, microphone, and webcams. Most of the time, users are given the option to deny these permissions and can change them in settings later if they should so choose. The thing is, your staff isn’t worried about permissions or wonky downloads – it’s not their laptop.

Ever evolving with the changing technology, cybercriminals have noticed the vulnerabilities in web application permissions and have found a way to crack security processes and infiltrate user networks.

According to the McAfee Labs Report released in June 2016, “cybercriminals manipulate two or more apps to orchestrate attacks capable of exfiltrating user data, inspecting files, sending fake SMS messages, loading additional apps without user consent, and sending user location information to control servers.”

Because users have given permission to much of their confidential information on their (and their company’s) devices, if a hacker breaks into the app’s system, they can easily travel between systems, stealing financial, confidential and potentially damaging information. Unless you have verified that the software app includes tough security code to crack, you should never give access to your microphone, camera or in some instances, your GPS location.

It’s common for applications to ask users for permission to access microphones, cameras AND photos, contacts, GPS location and phone status and identity. This last permission, as reported by the Washington Post, is for apps to know when to power off or pause use, such as when the phone rings or there’s a teleconference call. This last app permission is also looking to make sure that your device is not using pirated software, which can potentially lead to a botnet attack as seen in the Dyn attack back in October.

Unless you’re using a trusted application with an impeccable cybersecurity record, you should not agree to microphone, camera, contacts or other access. To safeguard against the threat of a cyber attack, train your staff about what is acceptable company computer usage and make sure you get a cyber insurance policy; if an attack should hit your network, cyber insurance will pay for the damages.

Is your network protected? It might be best to run a test and make sure your network isn’t already compromised, darn those messaging apps!

When To Actually Deny Mobile App Permissions

IMAGE: THABBET
Richard Darell

Richard Darell is the founder and CEO of Bit Rebels, a multifaceted online news outlet that reports daily on the latest developments in technology, social media, design and everything geek. Today this media entity welcomes more than 3.5 million unique visitors per month and is considered the go-to place for people in constant motion. As an Internet entrepreneur, he is dedicated to constantly trying to develop new ways to bring content faster and closer to the end user in a more streamlined way. His excitement for statistics has allowed him to further develop systems that continuously produce accurate and fast-paced analytics to better optimize the approach by which Bit Rebels presents news and content. His graphic design background has proven to be an important tool when designing new systems and features for Bit Rebels since the development of solid and stable code depends entirely on their structure and implemented procedures. Richard currently resides in Stockholm, Sweden and directs the Bit Rebels offices in both Stockholm and Atlanta. You can reach Richard at richard@bitrebels.com

Recent Posts

The Unexpected Ways Digital Communities Are Changing Sports Betting Trends

We’ve seen a rise in social gaming sites over the years. These sites, which are…

23 hours ago

Behind The Latest Vaping Designs

The vaping industry continues to evolve, with product designs becoming more sophisticated and user-centric. Modern…

24 hours ago

Pros And Cons Of AI Generated Content: Efficiency And Quality

As digital landscapes evolve, more marketers, content creators, and businesses are asking, what is AI…

1 day ago

How SEO Services In San Francisco Help Small Businesses Stand Out?

Today, small businesses have an incredible opportunity to grow beyond traditional means and reach new…

2 days ago

The Psychology Behind Competitive Online Gaming: Why We Keep Coming Back

Online competitive games have long been a cultural phenomenon, drawing millions worldwide. From strategic block…

2 days ago

Navigating Global Market Diversity With Dynamic Product Roadmaps

In a world where companies constantly strive to tap into new markets, they also face…

3 days ago