• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Twitter and TikTok’s data privacy controversies show the dangers of third-party apps
Security

Twitter and TikTok’s data privacy controversies show the dangers of third-party apps

September 1, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Coalition raises $250M to support its cyber insurance solution
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


The month of August was devastating for consumer and enterprise confidence in big tech and social media giants. Researchers discovered that TikTok uses keystroke tracking [subscription required] to track every character a user types in its in-app browser. Though the company claimed it uses this for troubleshooting. Separately, a whistleblower, Peiter “Mudge” Zatko, Twitter’s former head of security, has alleged that the organization misled its own board, as well as government regulators, about security vulnerabilities.

The supposed controversial data handling practices of TikTok and Twitter shed light on how consumers and enterprises cannot afford to implicitly trust social media companies to collect data responsibly and implement adequate security controls to protect it. 

Going forward, enterprises need to be more proactive about controlling the use of social media apps on work devices, and not fall into the trap of trusting the security measures of third parties, which could expose sensitive information. 

The data privacy exposure risks created by TikTok

Out of all the revelations emerging about big tech’s management of users’ personal data, TikTok’s suspected use of keystroke tracking or keylogging is perhaps the most shocking. 

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

This could mean that “anyone using their phone with the TikTok app on it could be exposing username and password data without even realizing it,” said Matthew Fulmer, manager of cyber intelligence engineering at Deep Instinct. 

See also  Instagram was fined $402 million in the EU for making young users’ data public

When considering that TikTok has more than one billion users, and 55% of employees are using personal smartphones or laptops for work at least some of the time, there is a significant risk to both enterprise and personal data. 

“When looking at a breakdown of keylogging, it’s extremely easy to find the user and the password. If this is all being offloaded to external servers (which there is no clear understanding who has access to them), who knows that level of access might be readily available within certain companies,” Fulmer said.

For security teams, this means that any employees who have entered usernames and passwords on personal devices with the TikTok app could be putting their online accounts at increased risk of credential theft if a threat actor gains access via one of these external servers. 

What about Twitter’s data protection? 

Over the years, Twitter has received criticism over its ineffective security policies, from failing to prevent President Obama’s account from spreading a Bitcoin scam to a data breach discovered in July 2022 that exposed the data of 5.4 billion users. 

While no company can prevent data breaches entirely, in this latest breach Twitter failed to fix a vulnerability that it had been aware of since January. 

Given the volume of personally identifiable information (PII) Twitter collects, and the fact that users must opt-out to ensure their information is not shared with third parties, many risks exist. After all, while the organization can use this information to personalize experiences for users, these expansive data collection policies can backfire dramatically if adequate security controls aren’t in place. 

See also  Google focused on making its iPhone apps more iOS native

Of course, Twitter isn’t the only social media provider that’s had problems maintaining users’ privacy. Less than two weeks ago, Meta reached a $37.5 million settlement for tracking users’ movements even though they’d turned off location services on their phones, using their IP addresses to determine where they are. 

The writing on the wall is that organizations and users can’t afford to trust companies like Twitter and Meta to put their data protection first. 

“The challenge is not a careless or heartless senior management; they are up against conflicting objectives,” said Jeffrey Breen, chief product officer at Protegrity. “Businesses must use sensitive data to drive growth, but they also are facing an increasingly complex web of legislation to protect that same source of growth. They either lock it up or use it and run the risk that it may be breached.”

How CISOs can mitigate the risks of third-party apps 

Ultimately, any third-party apps used in the workplace increase risk. 

Social media apps are in a particularly high-risk category because it is difficult to quantify precisely what data social media apps are collecting on users, how this data is processed, and whether the provider implements adequate security controls to prevent it from falling into the wrong hands. 

CISOs have a critical role to play in controlling the risks created by social media apps, not only defining the parameters of bring-your-own-device (BYOD) policies and restricting the use of personal devices, but implementing controls to determine which apps are permitted on enterprise devices. 

“The devices utilized by employees need to be much more closely monitored and locked down to prohibit [the] installation of third-party applications which can contain unknown code and processes,” said Brendan Egan, digital marketer, technology and security expert and CEO of Simple SEO Group.

See also  The bane of Silicon Valley: How Web3 solves the geographical siloes of innovation 

According to Egan, instead of relying on Google, Apple or Microsoft to vet the security of apps listed in their app stores, CISOs will need to take a more proactive role to maintain visibility over which third-party apps are installed on private and enterprise devices. 

After all, with data privacy regulations continuously expanding, organizations can’t afford to trust the data-handling practices of third parties, and must act as if every application is collecting data it shouldn’t be, and even handling it poorly. 

For users, Lorri Janssen-Anessi, director of external cyber assessments at Blue Voyant, discourages the linking of corporate accounts or social media with these applications and encourages use of a VPN to hide geolocation data. She added that carefully reading the end-user license agreement before downloading any new apps is also a best practice to follow. 



Source link

Apps controversies dangers data privacy show Thirdparty TikToks Twitter
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Google Mourns Veteran Engineer Luiz André Barroso Who Invented the Modern Data Center

September 22, 2023

The Inventor Behind a Rush of AI Copyright Suits Is Trying to Show His Bot Is Sentient

August 31, 2023

How To Build Authority And Credibility With An Online Show

August 24, 2023

The Most Popular Digital Abortion Clinics, Ranked by Data Privacy

August 21, 2023
Add A Comment

Comments are closed.

Editors Picks

Numatic Henry HVR160 review: A reliable all-rounder

September 9, 2022

The Fraud-Detection Business Has a Dirty Secret

March 8, 2023

Steam Deck shipments are going out early for some Q4 reservations

August 23, 2022

Opinion: Viral ‘BeReal’ app designed to capture real-life moments, but how authentic is it really?

July 7, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.