Risk
4/5/2011
02:41 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Feds Probe Mobile App Privacy

Pandora, an online music service, got hit with a subpoena that appears to be part of an investigation into the information sharing processes of apps that run on Apple and Android mobile platforms.

Best Mobile Apps For Busy Professionals
(click image for larger view)
Slideshow: Best Mobile Apps For Busy Professionals
Federal prosecutors in New Jersey are investigating how mobile apps use personal data, according to an unnamed source cited in a story by the Wall Street Journal.

A spokesperson for the Office of the U.S. Attorney in New Jersey declined to comment, citing a policy of not discussing any ongoing investigation.

But on Monday, Pandora, an online music service that distributes mobile music apps, confirmed that earlier this year it had been "served with a subpoena to produce documents in connection with a federal grand jury, which we believe was convened to investigate the information sharing processes of certain popular applications that run on the Apple and Android mobile platforms."

Pandora revealed that it had received the subpoena in a financial filing with the SEC. The company noted that while it was not a specific target in the investigation, it could nonetheless incur costs to comply with the subpoena and might be dragged into litigation.

The revelation follows a series of reports by the Wall Street Journal about online privacy. In October, the paper found that the 10 most popular Facebook apps were sending Facebook UIDs (user IDs) to at least 25 data collection and advertising firms. In December, it found that 56 out of 101 popular smartphone apps transmitted the phone's unique device ID number without consent and that almost as many transmitted location data.

These findings have piqued the interested of regulators at the Federal Trade Commission and the Department of Justice and have prompted at least one lawsuit already.

The Federal Trade Commission has been backing a do-not-track proposal and legislators like Senator Jay Rockefeller say that basic privacy rules are necessary. In all likelihood, the era of self-regulation for mobile and online apps will soon end.

While privacy rules may provide a framework to punish those acting in bad faith, they're not likely to ensure individual privacy. Without a complete source code review by a third-party -- something that's not likely to happen -- it's relatively easy for an ill-intentioned developer to spirit information out of a user's phone. A simple method would be to cache sensitive data and transmit it, perhaps in encrypted or obfuscated form, a month or two after installation.

Even with a mobile operating system like Android, which requires users to authorize network access in apps, the fundamental problem is that personal and financial data be used both legitimately and illegitimately and it's not always possible to divine intent from raw data.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2329
Published: 2015-08-31
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by ...

CVE-2014-2330
Published: 2015-08-31
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown ...

CVE-2014-2331
Published: 2015-08-31
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2332
Published: 2015-08-31
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2570
Published: 2015-08-31
Cross-site scripting (XSS) vulnerability in www/make_subset.php in PHP Font Lib before 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.