Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

6/26/2013
12:33 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lookout: 1 Million Consumers Have Adware

Lookout Mobile Security app for Android will now flag ad networks that do not comply

San Francisco, CA, June 26 -- Lookout, the leader in security technology that protects people and businesses from mobile threats, today announced its standard for classifying adware. Adware is an ad network that exhibits intrusive behavior without gaining appropriate consent from a user, which can pose a privacy risk. Additionally, Lookout now flags ad networks newly classified as adware in Lookout Mobile Security for Android, providing users with new insight and information on how to remove any applications containing adware.

Mobile privacy is an increasingly important topic for consumers and app developers, and adware is a risk to user privacy and one of the most prevalent threats on mobile worldwide. Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, and approximately 6.5% of free apps on Google Play today contain adware. In the past year, Lookout estimates that more than one million US Android users downloaded adware.

Ad networks are a vital element in the mobile ecosystem, allowing app developers a way to offer free applications to consumers. Ad networks that overstep user privacy bounds or negatively affect user experience create conflict, compromising not only consumers' privacy and user experience, but also the developer community that relies on mobile ad networks to bring free products to market.

To date, there has not been a widely-adopted set of guidelines that define what constitutes adware by the broader mobile industry. Lookout defines adware as an ad network that exhibits one or more of the following intrusive behaviors without requesting appropriate user consent: display advertising outside of the normal app experience, harvest unusual personally identifiable information, or perform unexpected actions as a response to ad clicks. Appropriate user consent entails providing a clear alert in the application that allows the user to accept or decline before any of the above behaviors takes place.

Lookout has demonstrated an ongoing commitment in guiding the industry to safer mobile advertising practices. In July 2012, Lookout released Mobile App Advertising Guidelines, a playbook aimed to curb aggressive ad network behavior and encourage the mobile advertising and developer communities to adopt practices that prioritize transparency and user privacy.

The Lookout app for Android now flags ad networks that Lookout classifies as adware, so Lookout users have the ability to make more informed decisions about the apps they have on their device. Download the Lookout app for Android from Google Play.

Adware Data:

Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, which is relatively higher than other mobile threats.

In the US, a new Lookout user has a 0.9% likelihood of having adware on their device, as recently released in Lookout's Mobile Threats Around the World report.

In the past year, Lookout estimates that more than one million U.S. Android users downloaded adware.

Today, approximately 6.5% of free apps on Google Play contain adware, but the prevalence of adware in third-party app stores is significantly higher.

Lookout found adware is most prevalent in personalization (26%), racing (23%) and sports games (18%) applications categories.

How to Stay Safe:

When downloading apps, make sure you are aware of and comfortable with the application's permissions before giving consent.

Only download apps from official app stores, such as Google Play or the App Store.

Use a security app, like Lookout, that will inform you if adware is detected on your device.

Tips for Developers:

Provide transparency and context to users about the data an application is accessing or collecting.

Pick a responsible ad network by carefully researching the ad network's user experience and privacy policy.

Handle device and identifying user data responsibly (data should always be transmitted and stored using strong encryption).

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Leveraging a network of more than 40 million devices worldwide, Lookout proactively prevents fraud, protects data and defends privacy to make the world safer as more people and devices become connected. Lookout Mobile Security, the flagship consumer product is available on Android, iOS and Kindle. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company and received the 2013 Laptop Editor's Choice Award. Lookout has offices in San Francisco and London, and is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information, please visit www.lookout.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2020-26564
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFil...
CVE-2020-26565
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.
CVE-2020-26806
PUBLISHED: 2021-07-31
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.