Just Because a Mobile VPN App Is Popular Doesn’t Mean It Is Protecting Your Privacy

Posted by Ben Spector on 27-Jan-2019 14:49:15

 shutterstock_1130046293

A study of the top free VPN apps available in Apple’s App Store and Google Play revealed that some of them might not be protecting your privacy as promised. Find out what the researchers discovered.

Using free public Wi-Fi networks at airports, hotels, and restaurants is convenient when traveling for business, but it can be risky. If you connect to an unsecured public Wi-Fi network, you run the risk of having hackers eavesdrop on your electronic conversations.

In theory, you can use a virtual private network (VPN) app to protect your privacy and data when using your mobile device within public Wi-Fi networks. In reality, that might not be the case if you are using a free mobile VPN app.

study of the top free VPN apps available in Apple’s App Store and Google Play revealed that most of them have no formal privacy policies or unacceptable ones. Plus, many of them are from obscure Chinese companies that deliberately make it difficult for people to find out anything about them. Equally concerning is that these apps often lack adequate customer support.

How the VPN Apps Were Selected

Researchers at Top10VPN.com selected the apps to study by searching for “VPN” in the App Store and Google Play for both the United States and United Kingdom sites. (Top10VPN.com is a VPN review site run by Metric Labs, an online security and privacy education company.) If a paid app appeared in the search results, the next one was selected. The top 20 VPN apps in each store at each site were listed, giving a total of 80 apps. Many of the apps appeared more than once in the list, so duplicate entries were removed. The end result was a list of the top 30 free VPN apps.

What the Study Found

For each app, the researchers investigated several elements, including the app company’s privacy policies, ownership, and customer support. One of the most concerning findings is that 86% of the apps are provided by companies that do not have any privacy policies or unacceptable ones. In regard to the latter, some of the companies have generic privacy policies that do not include any VPN-specific terms or policies that lack important details about data collection practices — both of which can give users a false sense of security. Other policies note that the companies track user activity and share it with third parties. Several policies even explicitly state that the companies collect and share users’ personal data with China.

Another troublesome finding concerns the companies providing the apps. “Our investigation uncovered that over half of the top free VPN apps [59%] either had Chinese ownership or were actually based in China, which has aggressively clamped down on VPN services over the past year and maintains an iron grip on the Internet within its borders,” said Simon Migliano, the head researcher at Top10VPN.com. Chinese legislation now forces local VPN providers to register with government authorities and obtain a license to operate. This is likely why some app privacy policies state that users’ personal data might be shared with China. For example, the privacy policies for the VPN Master, Turbo VPN, and SnapVPN apps state that “Our business may require us to transfer your Personal Data to countries outside of the European Economic Area (“EEA”), including to countries such as the People’s Republic of China or Singapore.” China’s VPN legislation coupled with the prevalence of Chinese hacking groups makes using VPNs provided by companies with links to this country risky to use.

The study also found that many of the top 30 apps have questionable user support. Specifically, 64% of the apps did not have dedicated websites for their VPN services. Several apps had no online presence whatsoever beyond their listings in the app stores.

Furthermore, 52% of the customer support email addresses specified in the app store listings were personal accounts (e.g., Gmail or Hotmail accounts). When the researchers sent emails to all the apps’ customer support email addresses requesting assistance, 83% of the emails were ignored. The emails were sent from the official top10vpn.com address and did not hide the researchers’ true identities.

You can find the details about all the apps investigated in the “Free VPN Apps: Chinese Ownership, Secretive Companies & Weak Privacy” report.

A VPN App Can Be Invaluable If You Pick the Right One

A VPN app can be invaluable if you use your mobile device within public Wi-Fi networks. It can protect your privacy and data if a network is not secured properly. However, when selecting a VPN app, it is important to do research and carefully evaluate the candidates, especially those that are free. If you need assistance selecting a safe VPN app for your mobile device, get in touch.

 Free Whitepaper: How to spot Phishing Attacks

 

Read More

Topics: mobile, apps, anti virus, Communications, cybersecurity

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: business tips, data protection, business, Business operations, cloud computing, cyber attacks, cyber threats, cybersecurity, data breach, Email Solutions, helpdesk, IT Support, security

SMBs are Still Common Targets in Ransomware Attacks

Posted by Ben Spector on 17-Dec-2018 12:06:21

shutterstock_552746107

 

Read More

Topics: cybersecurity, security, computer security, ransomware

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

Posted by Chris Selby-Rickards on 09-Jul-2018 14:54:56

virtual-honey-pot-sized

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

To discover the security risks that businesses might face when they use public clouds, researchers conducted an experiment using honeypots. Here is what the researchers discovered.

Read More

Topics: cloud computing, cloud, cybersecurity, hackers, hacking, small business, business

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Chris Selby-Rickards on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: computer security, hackers, scams, hacking, theft, servers, small business, security, protection, ransomware, phishing, passwords, fraud, firewall, data breach, cybersecurity, cyberattack, cybercrime, cyber threats, cyber, computers, cloud, business, breaches, anti virus

Business Email Scammers Put Behind Bars

Posted by Chris Selby-Rickards on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: anti virus, business, Business operations, computers, cyber attacks, cyber, cyber crime, cybersecurity, cybercrime, cyberattack, email, Disaster Recovery, fraud, IT Support, london, office 365, phishing, security, small business, ransomware

What is Phishing?

Posted by Chris Selby-Rickards on 20-Jun-2018 15:22:48

3 Ways Small Businesses Can Take Advantage of Artificial Intelligence

What is Phishing and How to Keep Your Company Safe From Phishing Attacks

Phishing is a type of cyberattack in which criminals essentially trick users into disclosing their personal information such as passwords, credit card numbers and so on. This is becoming an increasingly popular attack vector, with more than 3 in 4 (76 percent) organizations in the UK saying they experienced a phishing attack in 2017, according to figures collated by Wombat Security.

Read More

Topics: security, computer security, phishing, cybersecurity, cybercrime, cyber attacks, email

Cybercrime in Business

Posted by Chris Selby-Rickards on 01-Jun-2018 13:13:38

The Devastating Effects of Cyberattacks on Small Businesses

Cybercrime in Business.

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Centre shows that cybercrime victims lost more than £1 billion in 2017. Here are the top five IT-related cybercrimes that cost businesses and individuals the most amount of money.

Read More

Topics: security, cyber crime, cybercrime, cybersecurity, cyber attacks

What is Cloud Computing used for?

Posted by Chris Selby-Rickards on 02-May-2018 13:55:41

cloud data backup

What is Cloud Computing used for?

The Top 5 Benefits of Hybrid Cloud Backup

 

Have you switched your company’s backup solution to hybrid cloud backup yet? Find out 5 reasons why you should consider jumping onto the hybrid cloud backup bandwagon.

Read More

Topics: file sharing, data storage, onedrive, filing system, file share, folders, files, 365, computer security, microsoft, office, software, Backup, Business operations, chrome, cloud, cloud computing, Collaboration, computers, cybersecurity, Data, data backup, google, small business, security

Is the Cloud safe?

Posted by Chris Selby-Rickards on 02-May-2018 13:48:25

Is the Cloud safe? How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers often promise that they will take good care of their customers’ personal data. Here is how you can make sure they will deliver on that promise.

Read More

Topics: file sharing, data storage, onedrive, computer security, filing system, file share, folders, files, Data, cybersecurity, cloud computing, cloud, small business, security

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all