26,000 Malicious Apps Use Facebook APIs

Those APIs give developers easy access to user data.

26,000 Malicious Apps Use Facebook APIs 

The mop-up work for Facebook in the wake of its privacy reform could take much longer than we might expect. According to security company Trustlook, there are nearly 26,000 malicious apps currently using at least one Facebook application programming interface, any of which could give those developers access to information from Facebook profiles, including names, locations and email addresses.

The company noted that similar dangers exist in APIs provided for other social sites, including Twitter, LinkedIn, Google and Yahoo.

In response to the privacy problem, Facebook CEO Mark Zuckerberg said his company would audit thousands of apps and give users easier tools for managing how their data is used.

Trustlook sells security products and services using artificial intelligence to protect against sophisticated malware and other kinds of attacks.

According to a recent blog article on Trustlook's website, the problems that led to the Cambridge Analytica data-harvesting outrage resulted when developers abused certain Facebook APIs, specifically those associated with its login feature. When Facebook users tap the site's login to connect with other services, they grant those apps' developers access to information on their profiles. Beginning in 2015, the year before the Cambridge Analytica debacle, Facebook also allowed developers to access a bit of data from friends of users who used Facebook Login as well — whether or not they had agreed to hand over their data.

The security company has identified 25,936 "malicious apps" in use by Facebook users. That count was handled through its product, SECUREai App Insights, whose three flavors — mobile, core and IoT — are used by companies that want to embed security into their own products. The technology provides information on apps, including risky API calls and a risk score. According to the firm, three of the top five app stores use the program to assess the risk of the apps allowed into their stores.

"Whether Facebook can accomplish their goals remains to be seen, but it's clear the company needs better visibility into how user information is being handled by third-party apps," the company suggested. "And most likely it needs a sophisticated piece of software to help."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • interconnected cloud icons with glowing lines on a gradient blue backdrop

    Report: Cloud Certifications Bring Biggest Salary Payoff

    It pays to be conversant in cloud, according to a new study from Skillsoft The company's annual IT skills and salary survey report found that the top three certifications resulting in the highest payoffs salarywise are for skills in the cloud, specifically related to Amazon Web Services (AWS), Google Cloud, and Nutanix.

  • a hobbyist in casual clothes holds a hammer and a toolbox, building a DIY structure that symbolizes an AI model

    Ditch the DIY Approach to AI on Campus

    Institutions that do not adopt AI will quickly fall behind. The question is, how can colleges and universities do this systematically, securely, cost-effectively, and efficiently?

  • minimalist geometric grid pattern of blue, gray, and white squares and rectangles

    Windows Server 2025 Release Offers Cloud, Security, and AI Capabilities

    Microsoft has announced the general availability of Windows Server 2025. The release will enable organizations to deploy applications on-premises, in hybrid setups, or fully in the cloud, the company said.

  • digital brain made of blue circuitry on the left and a shield with a glowing lock on the right, set against a dark background with fading binary code

    AI Dominates Key Technologies and Practices in Cybersecurity and Privacy

    AI governance, AI-enabled workforce expansion, and AI-supported cybersecurity training are three of the six key technologies and practices anticipated to have a significant impact on the future of cybersecurity and privacy in higher education, according to the latest Cybersecurity and Privacy edition of the Educause Horizon Report.