Sunday, October 17, 2021

Singapore investigating claims Muslim app developer sold user Information to US military

Must Read

More than 80% of Companies re-structured Their cybersecurity infrastructure in 2020

The year 2020 was transformative.This shift was directed by large scale ventures. Little and medium-sized businesses have followed suit...

CISA issues emergency to Federal Agencies Regarding Microsoft Exchange Flaw

The US Department of Homeland Security agency's new emergency directive comes in the wake of major zero-day attacks on...

Indian supply-chain giant Bizongo suffers a massive data breach

Indian start-ups have been hit with a string of data breaches in recent days, and Mumbai-based digital supply-chain giant...

Singapore is investigating claims that a local-based mobile app, Muslim Pro, has offered”granular place data” into the US army. Clocking over 98.5 million downloads worldwide, the most favorite prayer monitoring program has denied the allegations, stating it stocks only anonymized information with its partners.

Clocking over 98.5 million downloads worldwide, the Muslim Pro app allegedly has marketed”granular place data” into the US army — an allegation it simplifies — and is presently being researched by Singapore’s Personal Data Protection Commission.

The regulator told local press: “We remind consumers to also be conscious of the kind of permissions and individual data they supply and how it could be utilized. If in doubt, users shouldn’t use or download some other program.”

It’s Muslim Pro app monitors prayer times and reveals the path to Mecca, among other attributes, and has been downloaded from consumers around 200 countries, based on its site.

Before this week, the program was reported to have sold granular place information to X-Mode, a US third-party data aggregator that sells its solutions to clients, which had comprised US defense contractors.

US-Canadian news outlet Vice Media broke the information in its title, saying that Muslim Pro was one of the other mobile programs that had sold information to the US army which had comprised timestamps, telephone model information, and the title of this Wi-Fi community to the telephone was connected.

This may consist of analyzing data to better understand user behaviors, therefore it might”enhance the general performance” of its services. It included that place data was utilized for prayer times calculation and eased designing and planning attributes, in addition to enhancing the overall user experience.

The App developer also insisted it didn’t discuss any sensitive personal data, such as title, contact number, and email. “Any information shared with partners is anonymized, meaning that our information isn’t credited to any particular people,” it stated.

“We employ industry-standard security structures and protective steps and choose top technology partners to keep our information safe and protected on our cloud infrastructure.

While it’d refuted Vice Media’s asserts, Bitsmedia stated it had terminated all connections with its information spouses, such as X-Mode, “effective immediately”.

It also said it collaborated with”chosen technology partners” to enhance the standard of its program and shared information with its partners to get”common functions like marketing”, which it mentioned was its principal source of earnings.

It stated it did so” in full compliance” with all applicable legislation and executed”rigorous data governance coverage” to protect its customers’ data.

As stated by the app programmer, it functioned with third parties like social networking networks and information analytics firms and shared information with the approval of its consumers.

Additionally, it noted that, apart from its Community segment, attributes supplied in Muslim Pro are made accessible without users needing to register into the program. “This leads to the anonymity of information we gather and procedure,” it stated.

Singapore only this month upgraded the data protection laws to enable local companies to utilize consumer information without previous consent for several functions, such as business advancement and study.

The amendments also permitted for harsher monetary penalties to be meted out for information breaches, over the last limit of SG$1 million.

In his address discussing the changes, Singapore’s Communications and Information Minister S. Iswaran said information was a key financial advantage in the electronic market as it provides invaluable insights that inform businesses and create efficiencies.

Additionally, it would enable innovation and improve products, and become a vital source for emerging technologies like artificial intelligence (AI) that maintain transformative capacity, Iswaran said.

Amongst the essential changes in the PDPA is that the”exceptions to the approval” requirement, which currently enables companies to utilize, gather, and disclose information for”legitimate purposes”, business development, and also a wider range of development and research.

Besides existing consent exceptions which include investigations and responding to crises, these now include attempts to fight fraud, improve products and solutions, and execute market research to understand potential client segments.

Additionally, further alterations defined under”deemed consent” into PDPA will now allow businesses to share information with outside contractors to fulfill client contracts. This caters to”contemporary industrial structures” and fundamental purposes including safety.

Firms will also have the ability to use the information without permission to ease R&D that may not yet be marked for productization.

The rest of the purposes beyond”deemed” and”exceptions” to agree, for example, direct marketing and advertising messages, will nevertheless need prior permission from customers.

The PDPC past year researched 185 cases involving information breaches and issued 58 decisions.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This