1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Zoom iOS App Sends Data to Facebook Even if You Don't Have a Facebook Account

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Zoom iOS App Sends Data to Facebook Even if You Don't Have a Facebook Account


IT Security Nachrichten vom | Direktlink: yro.slashdot.org Nachrichten Bewertung

As people work and socialize from home, video conferencing software Zoom has exploded in popularity. What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app. From the report: This sort of data transfer is not uncommon, especially for Facebook; plenty of apps use Facebook's software development kits (SDK) as a means to implement features into their apps more easily, which also has the effect of sending information to Facebook. But Zoom users may not be aware it is happening, nor understand that when they use one product, they may be providing data to another service altogether. "That's shocking. There is nothing in the privacy policy that addresses that," Pat Walshe, an activist from Privacy Matters who has analyzed Zoom's privacy policy, said in a Twitter direct message. Upon downloading and opening the app, Zoom connects to Facebook's Graph API, according to Motherboard's analysis of the app's network activity. The Graph API is the main way developers get data in or out of Facebook.

Read more of this story at Slashdot.

...

Externe Webseite mit kompletten Inhalt öffnen



https://yro.slashdot.org/story/20/03/26/1859228/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account?utm_source=rss1.0mainlinkanon&utm_medium=feed

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • Diving Deep Into a Pwn2Own Winning WebKit Bug

    vom 402.09 Punkte ic_school_black_18dp
    Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of
  • Get smart about preparing your app for OAuth verification

    vom 328.69 Punkte ic_school_black_18dp
    Posted by Nafis Zebarjadi, Product Manager and Adam Dawes, Senior Product Manager Project Strobe was started to help users have control over their data while giving developers more explicit rules of the road to ensure everyone is confident that their data is secure. One result of this effort has been to expand our app verification program to cover
  • Celebrating International Women’s Day with 20 tech trailblazers

    vom 321.1 Punkte ic_school_black_18dp
    Posted by Google Developer Studio Today is International Women’s Day and we’re kicking off the celebration with a profile series featuring 20 tech trailblazers who have made significant contributions to the developer community. Many of the women we s
  • CVE-2020-0729: Remote Code Execution Through .LNK Files

    vom 265.3 Punkte ic_school_black_18dp
    In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, John Simpson and Pengsu Cheng of the Trend Micro Research Team detail a recent remote code execution bug in Microsoft Windows .LNK files. The following is a portion of
  • ConstraintLayout 2.0.0 beta 2

    vom 222.2 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 2. It’s available from the google maven repository: dependencies {    implementation 'com.android.support.constraint:constraint-layout:2.0.0-beta2'} or if using the AndroidX packages: dependencies {    implementation 'androidx.con
  • Android Studio 3.2 Canary

    vom 217.37 Punkte ic_school_black_18dp
    Today at Google I/O 2018 we announced the latest preview of Android Studio 3.2 which includes an exciting set of features that support the Android P Developer Preview, the new Android App Bundle, and Android Jetpack. Download Android Studio 3.2 from our canary release channel today to explore
  • Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

    vom 216.12 Punkte ic_school_black_18dp
    Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven
  • CSI: The case of the missing WAV audio files on the FAT32 SD Card

    vom 215.18 Punkte ic_school_black_18dp
    Buckle up kids, as this is a tale. As you may know, I have a lovely podcast at https://hanselminutes.com. You should listen. Recently through an number of super cool random events I got the opportunity to interview actor Chris Conner who plays Poe on Altered Carbon. I'm a big fan of the show but espe
  • Scrounger - Mobile Application Testing Toolkit

    vom 213.95 Punkte ic_school_black_18dp
    Scrounger - a person who borrows from or lives off others. There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application's vulnerabilities. Why Even t
  • How you can share passwords safely with friends and family

    vom 213.74 Punkte ic_school_black_18dp
    http://bit.ly/366dCkG How you can share passwords safely with friends and family we’ve all been informed infinite instances to by no means proportion your passwords. now not even together with your nearest and dearest. this is tremendous recommen
  • Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

    vom 213.45 Punkte ic_school_black_18dp
    This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t
  • MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

    vom 209.45 Punkte ic_school_black_18dp
    In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N

Team Security Diskussion über Zoom iOS App Sends Data to Facebook Even if You Don't Have a Facebook Account