Mobile apps sharing usernames, passwords, credit card details with third parties: Study

Agencies
July 8, 2018

Washington, Jul 8: Some popular smartphone apps may be secretly taking screenshots of your activity and sending them to third parties, a study has found. This is particularly disturbing because these screenshots - and videos of your activity on the screen - could include usernames, passwords, credit card numbers, and other important personal information, researchers said.

"We found that thousands of popular apps have the ability to record your screen and anything you type," said David Choffnes, a professor at Northeastern University in the US.

"That includes your username and password, because it can record the characters you type before they turn into those little black dots," said Choffnes.

The study was designed to investigate a persistent urban legend that phones are secretly recording our conversations and then selling that information to companies so they can pepper you with targeted advertisements.

While the researchers found no evidence of recorded conversations, they discovered activity that could be even more dangerous.

"We knew we were looking for a needle in a haystack, and we were surprised to find several needles," said Choffnes.

What they found is that some companies were sending screenshots and videos of user phone activities to third parties. Although these privacy breaches appeared to be benign, they emphasised how easily a phone's privacy window could be exploited for profit.

"This opening will almost certainly be used for malicious purposes," said Christo Wilson, a professor at Northeastern.

"It's simple to install and collect this information. And what's most disturbing is that this occurs with no notification to or permission by users," said Wilson.

"In the case we caught, the information sent to a third party was zip codes, but it could just as easily have been credit card numbers," he said.

The researchers analysed over 17,000 of the most popular apps on the Android operating system, using an automated test programme written by the students.

Although the study was conducted on Android phones, researchers said there is no reason to believe that other phone operating systems would be less vulnerable.

In all, 9,000 of the 17,000 apps had the potential to take screenshots.

"In one case, the app took video of the screen activity and sent that information to a third party," said Wilson.

That app was GoPuff, a fast-food delivery service, which sent the screenshots to Appsee, a data analytics firm for mobile devices. All this was done without the awareness of app users.

Researchers emphasised that neither company appeared to have any nefarious intent. They said that web developers commonly use this type of information to debug their apps and improve the user experience.

However, that does not mean a malicious company could not use this privacy window to steal personal information for profit.

"That has the potential to be much worse than having the camera taking pictures of the ceiling or the microphone recording pointless conversations. There is no easy way to close this privacy opening," said Choffnes.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 7,2025

SHRIMP.jpg

Mangaluru, Dec 7: A rare bamboo shrimp has been rediscovered on mainland India more than 70 years after it was last reported, confirming for the first time the presence of Atyopsis spinipes in the country. The find was made by researchers from the Centre for Climate Change Studies at Sathyabama Institute of Science and Technology, Chennai, during surveys in Karnataka and Odisha.

The team — shrimp expert Dr S Prakash, PhD scholar K Kunjulakshmi, and Mangaluru-based researcher Maclean Antony Santos — combined field surveys, ecological assessments and DNA analysis to identify the elusive species. Their findings, published in Zootaxa, resolve decades of taxonomic confusion stemming from a 1951 report that misidentified the species as Atyopsis moluccensis without strong evidence.

The shrimp has now been confirmed at two locations: the Mulki–Pavanje estuary near Mangaluru and the Kuakhai River in Bhubaneswar. Historical specimens from the Andaman Islands, previously labelled as A. moluccensis, were also found to be misidentified and actually belong to A. spinipes.

The rediscovery began after an aquarium hobbyist in Odisha spotted a shrimp in 2022, prompting systematic surveys across Udupi, Karwar and Mangaluru. Four female specimens were collected in Mulki and one in Odisha, all genetically matching.

Researchers warn the species may exist in very small, vulnerable populations as freshwater habitats face increasing pressure from pollution, sand mining and infrastructure development. All verified specimens have been deposited with the Zoological Survey of India for future reference.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 26,2025

Mangaluru, Nov 26: Mangaluru East police have registered a case following a sophisticated online fraud where a 57-year-old local resident was allegedly cheated out of ₹13.4 lakh after being targeted on Facebook.

The scam began in February when the complainant, while browsing Facebook reels, was contacted by a woman identifying herself as "Lillian Mary George" from London. After establishing a chat relationship, the woman claimed she would visit India in November and bring a significant sum of money.

The trap was sprung on November 15, when the victim received a call from a woman named "Sonali Gupta," who claimed Lillian had arrived at Mumbai International Airport but was detained by customs. The fraudsters convinced the man that Lillian was carrying £25,000 (about ₹26 lakh) in traveller’s cheques and 1 kg of gold (valued at around ₹30 lakh).

Under the pretense of clearing these items, the victim was asked to make numerous online transfers between November 15 and 18 for various bogus charges, including:

•    "Pounds exchange registration"
•    "Customs declaration issues"
•    "Discount charges"
•    "Money-laundering charges"

Believing the fictitious story, the complainant transferred the cumulative sum of ₹13.4 lakh to various bank accounts provided by the fraudsters. He realised he was cheated when the culprits later promised a refund within two days but stopped answering his calls. The Mangaluru East police are now investigating the case, which highlights the continuing threat of transnational cyber fraud using social engineering and promises of fictitious wealth.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 24,2025

israelsyra.jpg

Israeli forces have pushed over the Syrian frontier, erecting a checkpoint and stopping vehicles in the southwestern city of Quneitra, in yet another breach of the Arab country’s sovereignty.

The violation took place on Sunday, when the troops made their way across the border, setting up the outpost near the Ain al-Bayda junction in northern Quneitra, Syrian outlets reported.

According to the al-Ikhbariya paper, an Israeli detachment positioned itself at the junction, halting cars and conducting searches.

The Syrian Arab News Agency (SANA) reported that three Israeli military vehicles then moved further into the northern countryside, deploying between the town of Jubata al-Khashab and the villages of Ofaniya and Ain al-Bayda. The agency added that a separate Israeli unit mounted a new incursion in the central region, approaching the villages of Umm Batina and al-Ajraf.

Residents said such activities have surged in recent months, pointing to Israeli advances onto farmland, leveling of extensive forested areas, arrests, and spread of mobile checkpoints.

The Israeli regime began markedly increasing its military aggression against Syria last year.

The escalation coincided with increasingly ferocious onslaughts throughout the country by the so-called Hay'at Tahrir al-Sham (HTS) Takfiri terrorist group, which the government of President Bashar al-Assad had confined to northwestern Syria. The HTS, however, managed to overthrow the government as the Israeli attacks would pummel the country’s civilian and defensive infrastructure.

Various reports have shown that, during the escalation, the regime conducted more than 1,000 airstrikes on the Syrian territory and over 400 ground raids into the south.

Following the collapse of the Assad government, Tel Aviv also widened its grip over the occupied Golan Heights by taking control of a demilitarized buffer zone, in defiance of a 1974 Disengagement Agreement. Earlier this month, senior Israeli officials, including Prime Minister Benjamin Netanyahu, visited the buffer zone, prompting expressions of alarm on the part of the United Nations.

The United States, the regime’s biggest ally, has, meanwhile, been fraternizing the HTS head Abu Mohammed al-Jolani amid the widely reported prospect of rapprochement with Tel Aviv.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.