Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Major Study Settles the Debate Between Apps vs. Websites

Major Study Settles the Debate Between Apps vs. Websites

When it comes to your most-used solution, is the mobile application a more secure choice in terms of user privacy, or does the website offer superior protection against leaked information? Researchers from Northeastern University sought to answer this question in a recent study comparing the app versions of programs against their web-based counterpart on Android and iOS devices.

Selecting a group of 50 of the most popular free services online with equal functionality in both the app and the website, the researchers compared the data leakage of information that could be used to identify a user from either platform. Being sure to sample from a variety of industry categories--including business, news, shopping, music, and even weather--the team would log in as if they were a regular user before tracking how their information is shared by the site to advertisers and data analytics companies.

So, between mobile apps and web-based services, which leaks more of a user’s information? According to research team member and assistant professor David Choffnes, that depends.

Choffnes stated that the team expected applications would leak more information by their more direct access to it. While their findings do support that hypothesis somewhat, the margin was much closer than they expected. In 40 percent of their tested cases, the website version of a service or function would share a greater variety of information with outside parties than the apps would.

The type of information shared also varied based on the platform a user chose. Websites, for example, would share the user’s name and location, while apps were far more likely to share a device’s unique ID number. Together, the app and website could collect a fairly comprehensive profile on the user, much to the surprise of the research team.

While there are legitimate reasons for these services to share out their information, the research team is concerned that the users are unaware of where their personal information is going, as many believe that their information is being held solely by the service they provide it to. However, the team hopes to spread awareness of credential and information sharing, and has even provided an online report of what information is leaked by particular apps, as well as an online tool to determine which method of accessing a service, the app or the web page, is the more secure option.

Information is an incredibly valuable and sensitive asset to a business, so it is best to know just where your information is going. For more information about how our data management services can help your business, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 May 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Gmail Ransomware Hardware Backup Apps Operating System Business Continuity Disaster Recovery Communication Hacking The Internet of Things Social Media WiFi Bandwidth Facebook Microsoft Office Office Content Filtering Cybercrime Wireless Technology Android Website Apple Best Practice Employer-Employee Relationship Alert Two-factor Authentication History Networking Small Business Data storage Phishing Data App Windows Experience Mobile Computing communications Big Data Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Smartphones Managed Service Provider Outlook Firewall IT Services Managed IT services Hosted Solution Heating/Cooling Windows XP Word Artificial Intelligence Documents Tech Support Compliance Bluetooth Drones Business Management Social Printer Competition Browser Automation Wireless Memory Presentation Virtual Desktop Entrepreneur Domains Unified Communications Securty Document Management Encryption Deep Learning VoIP BDR Law Enforcement Hacker SaaS Proactive IT Application Cortana Vendor Management Network Congestion Customer Service Save Money Music Monitors Router Office 365 Cryptocurrency Laptop IBM Displays Education Saving Money Google Docs Analytics Lithium-ion battery Cleaning Holiday intranet Processors End of Support Black Market YouTube LiFi Staffing Office Tips BYOD Downtime Social Networking Help Desk Writing Passwords Public Speaking Streaming Media Visible Light Communication Virtualization Disaster Micrsooft IP Address Business Growth Data Management Government Advertising Keyboard Recovery Robot Augmented Reality Search Society User Sports Retail Google Wallet Hard Drives Spam Information Technology Shortcut Running Cable Remote Computing DDoS Windows 8 Internet of Things
QR-Code