Monday, November 25, 2024
HomeComputer SecurityFacebook Admits Tracking non-FB-users Data using its Tools - 61 %...

Facebook Admits Tracking non-FB-users Data using its Tools – 61 % of Tested Apps Automatically Transfer Data To FB

Published on

New Investigation conducted based on the data tracking, brokerage reveal that Facebook tracking non-users and logged-out users outside its platform through its Business Tools.   

Researchers tested many numbers of apps and confirm that 61% of tested apps are frequently sharing the data into Facebook from the moment once user open the apps.

Privacy International analyzed the many of the Android Apps using some of the open source tools “mitmproxy“, an interactive HTTPS proxy in order to sniff the traffic to findout the apps activities.

- Advertisement - SIEM as a Service

Apps Developers are using Facebook Software Development Kit (SDK) to share the data to Facebook.

Apart from this, Apps are frequently sending data into Facebook sometimes it contains users sensitive data regardless of either user’s opt-outed from Facebook or users who do not have a Facebook account.

” Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account.”

Privacy International Findings – Facebook Tracking

According To Privacy international findings here the some of key facts that performing by Facebook to collect the users Data.

  • 61 % of Tested Apps are automatically sending data FB including non-FB users and logged-out users.
  • In order to links advertiser with user behavior from different apps , apps that automatically transmit data to Facebook with a unique identifier, Google AAID & Apple’s IDFA.
  • It collects people’s activities, interests, behaviors and routines, some of which can reveal special category data, including information about people’s health or religion
  • Initially events data that communicates to Facebook using Facebook SDK which is initialized by transmitting data such as “App installed” and “SDK Initialized” to report each and every time when users open the specific apps.
  • Example tested apps are “Qibla Connect” (a Muslim prayer app), “Period Tracker Clue” (a period tracker), “Indeed” (a job search app), “My Talking Tom” (a children’s’ app),
  • Major 3 events “App installed”, “SDK Initialized” and “Deactivate app” alone shared the hundreds of millions of peoples users behavior.
  • Some of the data that sharing into Facebook are aggressively sensitive and its very detailed.
  • Main Example travel search and price comparison app “KAYAK”, which sends detailed information about people’s flight searches to Facebook, including: departure city, departure airport, departure date, arrival city, arrival airport, arrival date, number of tickets. 
  • Facebook’s Cookies Policy describes two ways in which people who do not have a Facebook account can control Facebook’s use of cookies to show them ads. Privacy International has tested both opt-outs and found that they had no discernible impact on the data sharing that we have described in this report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Top 10 Best Ways To Secure Your Computer from Cyber Attacks

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...