Tuesday, March 4, 2025
HomeAndroidFacebook Released New Location Privacy Control for Android Users to Stop Collecting...

Facebook Released New Location Privacy Control for Android Users to Stop Collecting Location Data

Published on

SIEM as a Service

Follow Us on Google News

Facebook announced new location privacy control future for Android users that allows users to control their location data that collects by Facebook.

Android provides an option for its users to control their location by turn off/on that helps to control the location data whether Facebook or other apps collection users precise location.

Facebook users frequently asking one of the important questions that whether Facebook collect the data from users who don’t even use Facebook Account.

In order to answer this question, Facebook introduced this new future for a new background location control on Facebook.

This new tool provides control for Facebook users to turn off/on the location setting whether you want Facebook to collect your data when you’re not using the Facebook app.

In the previous setting, users turned on location setting which means that Facebook can collect the user’s data even when they aren’t using the app but the new location privacy control background location settings provide control users let Facebook stop collecting the location data when users are not opted-in.

Paul McDonald, Engineering Director, Facebook said ” For people who previously chose to turn their Location History setting “on,” the new background location setting is “on.” For people who had turned Location History “off” – or never turned it on in the first place – the new background location setting is “off.” “

You can find the location privacy control option by clicking the Settings & Privacy > Settings > Location > Location Settings, where you can see the new option called Background Location to Turn off/on.

“We’re alerting everyone using the Facebook app on an Android device who chose to turn on Location History in the past, letting them know about the new control, and asking them to take a moment to check that their settings are right for them. If you’ve never turned on Location History, you don’t have to do anything. We won’t turn either of these settings on unless you specifically tell us to.” Facebook Quoted in their statement.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Facebook Admits Tracking non-FB-users Data using its Tools – 61 % of Tested Apps Automatically Transfer Data To FB

Clickjacking Bug in Facebook Being Abused By Attackers To Post Spam On Your Facebook Wall

A New Facebook Bug May have been Exposed 6.8 Million Users Private Photos



Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...