{"id":4728,"date":"2012-03-27T15:39:00","date_gmt":"2012-03-27T15:39:00","guid":{"rendered":"https:\/\/evssolutions.com\/mobile-applications-and-data-mining-cause-security-issues\/"},"modified":"2012-03-27T15:39:00","modified_gmt":"2012-03-27T15:39:00","slug":"mobile-applications-and-data-mining-cause-security-issues","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/mobile-applications-and-data-mining-cause-security-issues\/","title":{"rendered":"Mobile Applications and Data Mining Cause Security Issues"},"content":{"rendered":"

In a world of smartphones and tablets galore, downloading an
\napplication has become just as natural as sending an email. One thing that all
\nmobile users need to take into consideration is the risks that come with mobile
\ntechnology. This month, it was reported that a downloadable app for iOS and
\nAndriod based phones was collecting address book information from its users
\nwithout permission. Several companies including Apple, Facebook, and Twitter
\nare all facing lawsuits
\nas a result of this occurrence. <\/span>In a
\nblog featured in the New
\nYork Times<\/a>, it lists several of the applications that users have experience
\nthis type of breach.
<\/p>\n

<\/p>\n

This may seem harmless enough, but it raises major issues
\nfor security measures in the mobile space. Users need to use extreme caution
\nbefore trusting any type of application on their mobile device. While
\nextracting your contacts may seem intrusive enough, imagine the type of
\ninformation applications can store when using
mobile banking<\/a>. Perhaps the most frightening part of breaches such as these is the
\nfact that many times this fraud is preventable, just overlooked. As
David
\nMorin<\/a>, executive chief of Path, stated the data collection was not an accident.
\nOther personnel from the Electronic Privacy Information Center also commented
\non the lack of understanding companies have on such data mining.
<\/p>\n

Banks, prepaid<\/a>,
\nand other industries that collect personal information for the use of an
\napplication need to be aware of the risks for
ID
\ntheft<\/a>. Software companies and developers may have access to any personal
\ninformation stored on a mobile device. Even though mobile banking is sweeping
\nthe industry, businesses must look into deeper
fraud prevention<\/a>
\nmeasures to avoid issues such as these.
<\/p>\n

[Contributed by, EVS Marketing]
<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

In a world of smartphones and tablets galore, downloading an application has become just as natural as sending an email. One thing that all mobile users need to take into consideration is the risks that come with mobile technology. This<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,36,37],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4728"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4728"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4728\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}