Feeds

Lookout mulls flagging privacy-invading phone apps as adware

Free virus detector considers crackdown on freebies

HP ProLiant Gen8: Integrated lifecycle automation

Lookout Mobile Security has taken steps towards classifying privacy-eroding phone apps as malign and ripe for removal from devices by its antivirus software.

Many free mobile applications generate revenue by using advertising networks and exchanges to show in-app ads, and in most cases everything is ethical and above board.

However Lookout researchers discovered some of these advertising suppliers quietly access personal information on the phones - including handset owners' email addresses, numbers and names.

"Many of these ad providers also use aggressive mobile ad delivery techniques that can confuse users, like changing bookmark settings or delivering ads outside the context of an individual app," Lookout explains.

19,000 of the 380,000 free apps (5 per cent) analysed by Lookout used questionable or aggressive tactics. On Google Play, apps in the personalisation category (for example, wallpaper apps) have the highest percentage of aggressive ad networks (at 17 per cent), closely followed by comics (13 per cent), arcade & action (10 per cent) and entertainment (8 per cent).

Lookout warns that privacy-invading apps are more prevalent than malware. The security firm has drawn up a list of guidelines on acceptable behaviour for mobile apps, as explained in this blog post.

The firm may later use these guidelines as a benchmark for deciding whether to flag up particular apps as a privacy or security risk to customers of its mobile security software. Lookout, which provides virus detection and elimination software for Apple iOS and Google Android phones, has yet to start classifying any mobile apps as adware.

The US-based biz is in discussion with advertising networks and app developers about the issue in order to thrash out a code of practice.

The draft guidelines cover best practices in the following areas: transparency and clarity of data collection; control over information collected; ad delivery and display behaviour; collection and retention of personal or device-specific data; and secure transport of sensitive data.

"This is a living document that will change as the industry evolves, but ad providers that do not follow the basic requirements could be flagged as adware," Lookout stated (our emphasis).

The company's researchers have drawn attention to an important issue, and their figures are a worthwhile contribution to the debate, but users looking to use its mobile security application as a way to ward off invasive apps will be disappointed, at least for now.

From desktop plagues to mobile menaces

The Ad Network Detector app from Lookout shows what types of ads can be displayed and what personal information is collected by a network. This functionality is there for information purposes only, and it doesn't provide automatic warnings.

Advertising-spewing adware was, of course, a big problem on desktop machines several years ago. Security firms, most notably Kaspersky Lab, successfully fought lawsuits against firms angered that their ad-slinging tech was classified as malign or unwanted. A similar reaction could happen in the mobile arena, hence Lookout's understandable caution.

Lookout said it wanted to equip mobile advertisers and developers with clear privacy and user-experience guidelines so as to "enable growth and innovation in mobile advertising, while protecting user privacy and increasing the trustworthiness of ads".

As well as talking to developers and ad networks, mobile security firms such as Lookout ought to get mobile carriers, regulators and privacy activists involved in tackling the issue. One privacy campaign group is already on board.

Jules Polonetsky, director and co-chair of the Future of Privacy Forum, commented: “For many years, desktop users were plagued with programs that triggered pop-ups, added unwanted toolbars, and changed [web browser] home pages. These guidelines make it clear, while mobile marketing business models and practices are still developing, some practices are out-of-bounds. That’s good news for both consumers and responsible businesses.”

Lookout Mobile Security provides free and paid-for security utilities for phones. The premium version includes a phishing and malicious website blocker, privacy adviser, backup manager, and remote wipe functionality missing from its freebie sibling, which focusses on provides warnings about mobile malware. Lookout boasts 20 million users, the vast majority of whom are assumed to be running freebie versions of its software.

We suspect that the mobile adware warning functionality - as and when it appears - will be sold as a premium service. ®

Top three mobile application threats

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.