Sunday, December 29, 2024
HomeComputer SecurityFacebook Admits Tracking non-FB-users Data using its Tools - 61 %...

Facebook Admits Tracking non-FB-users Data using its Tools – 61 % of Tested Apps Automatically Transfer Data To FB

Published on

SIEM as a Service

New Investigation conducted based on the data tracking, brokerage reveal that Facebook tracking non-users and logged-out users outside its platform through its Business Tools.   

Researchers tested many numbers of apps and confirm that 61% of tested apps are frequently sharing the data into Facebook from the moment once user open the apps.

Privacy International analyzed the many of the Android Apps using some of the open source tools “mitmproxy“, an interactive HTTPS proxy in order to sniff the traffic to findout the apps activities.

- Advertisement - SIEM as a Service

Apps Developers are using Facebook Software Development Kit (SDK) to share the data to Facebook.

Apart from this, Apps are frequently sending data into Facebook sometimes it contains users sensitive data regardless of either user’s opt-outed from Facebook or users who do not have a Facebook account.

” Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account.”

Privacy International Findings – Facebook Tracking

According To Privacy international findings here the some of key facts that performing by Facebook to collect the users Data.

  • 61 % of Tested Apps are automatically sending data FB including non-FB users and logged-out users.
  • In order to links advertiser with user behavior from different apps , apps that automatically transmit data to Facebook with a unique identifier, Google AAID & Apple’s IDFA.
  • It collects people’s activities, interests, behaviors and routines, some of which can reveal special category data, including information about people’s health or religion
  • Initially events data that communicates to Facebook using Facebook SDK which is initialized by transmitting data such as “App installed” and “SDK Initialized” to report each and every time when users open the specific apps.
  • Example tested apps are “Qibla Connect” (a Muslim prayer app), “Period Tracker Clue” (a period tracker), “Indeed” (a job search app), “My Talking Tom” (a children’s’ app),
  • Major 3 events “App installed”, “SDK Initialized” and “Deactivate app” alone shared the hundreds of millions of peoples users behavior.
  • Some of the data that sharing into Facebook are aggressively sensitive and its very detailed.
  • Main Example travel search and price comparison app “KAYAK”, which sends detailed information about people’s flight searches to Facebook, including: departure city, departure airport, departure date, arrival city, arrival airport, arrival date, number of tickets. 
  • Facebook’s Cookies Policy describes two ways in which people who do not have a Facebook account can control Facebook’s use of cookies to show them ads. Privacy International has tested both opt-outs and found that they had no discernible impact on the data sharing that we have described in this report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Top 10 Best Ways To Secure Your Computer from Cyber Attacks

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...