<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#8211; Tech AI Connect</title>
	<atom:link href="https://techaiconnect.com/tag/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://techaiconnect.com</link>
	<description>All Tek Information for You</description>
	<lastBuildDate>Sun, 09 Feb 2025 06:45:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>DeepSeek ios app exposes sensitive data due to encryption flaws</title>
		<link>https://techaiconnect.com/deepseek-ios-app-exposes-sensitive-data-due-to-encryption-flaws/</link>
					<comments>https://techaiconnect.com/deepseek-ios-app-exposes-sensitive-data-due-to-encryption-flaws/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Sun, 09 Feb 2025 06:45:19 +0000</pubDate>
				<category><![CDATA[Article]]></category>
		<category><![CDATA[AI Chatbot]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[NowSecure]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/?p=3642</guid>

					<description><![CDATA[In a shocking revelation, the DeepSeek iOS app, developed by a lesser-known Chinese company, has been found to transmit sensitive data over unencrypte]]></description>
										<content:encoded><![CDATA[<p>In a shocking revelation, the DeepSeek iOS app, developed by a lesser-known Chinese company, has been found to transmit sensitive data over unencrypted channels to ByteDance-controlled servers. This alarming security breach comes just weeks after DeepSeek launched an open-source AI chatbot, quickly rising to prominence in the App Store, surpassing even ChatGPT in downloads. Mobile security firm NowSecure disclosed that the app does not use App Transport Security (ATS) effectively, allowing potentially harmful data exposure during transmission. </p>
<p><img src='https://techaiconnect.com/wp-content/uploads/2025/02/deepseek-ios-app-exposes-sensitive-data-due-to-encryption-flaws-2.webp' alt='DeepSeek ios app exposes sensitive data due to encryption flaws' /></p>
<p>NowSecure&#8217;s report highlights that while some data is protected by transport layer security during communication, it remains vulnerable once it reaches ByteDance&#8217;s servers. The unencrypted transmission, particularly during the initial app registration, poses severe risks, as sensitive user data could be intercepted or modified by malicious actors. Users are left exposed, as the app&#8217;s failing security controls contradict Apple’s strong encryption guidelines.</p>
<p>Further compounding security concerns, the DeepSeek app reportedly employs the outdated encryption protocol 3DES, which has been deemed insecure and deprecated due to its vulnerability to various types of attacks. This choice, combined with hardcoded symmetric keys that are the same for every user, presents a glaring security failure that experts have criticized.</p>
<p>Andrew Hoog, co-founder of NowSecure, expressed grave concerns about the DeepSeek app&#8217;s lack of basic security frameworks. He stated, &#8220;The app is not equipped or willing to provide basic security protections of your data and identity.” This highlights the overarching concern that the app, intentionally or not, fails to adhere to fundamental cybersecurity practices, placing users&#8217; data at significant risk.</p>
<p>Additionally, privacy policies revealed that DeepSeek retains the right to share user information with law enforcement tiers, raising alarm bells about potential data misuse and abuse. Despite this, When contacted, representatives for DeepSeek and Apple did not respond to inquiries about these security breaches.</p>
<p>As scrutiny intensifies, U.S. lawmakers advocate for immediate action against the DeepSeek app, highlighting potential national security risks tied to the app&#8217;s Chinese origins. The fears primarily stem from the possibility that the Chinese Communist Party could exploit vulnerabilities within DeepSeek to access sensitive American user data.</p>
<p>The vulnerabilities detailed by NowSecure also echo reports from other credible sources that DeepSeek&#8217;s AI models demonstrate concerning failures against malicious prompts and experiments. Malicious prompts devised to exploit the AI assistant resulted in an alarming 100% failure rate, emphasizing significant weaknesses within the algorithmic architecture itself.</p>
<p>With security concerns mounting, experts including Thomas Reed from Huntress noted that the unencrypted HTTP endpoints are particularly alarming in an age where cybersecurity threats are rampant. He condemned the decision to disable ATS, contending that there’s no valid reason for such negligence when developing modern applications. “Even if they managed to secure communications, sending sensitive data to a server potentially accessible by the Chinese government remains an unacceptable risk,” Reed stated, exposing the evident challenges faced by users of DeepSeek.</p>
<p>In the wake of these revelations, the recommendation from security experts is clear: users and organizations should immediately remove the DeepSeek iOS app from all devices to protect against potential data breaches and privacy violations. The findings about the Android version of DeepSeek paint an even dire picture, as it has been deemed even less secure than its iOS counterpart.</p>
<p>The ongoing investigation by NowSecure has yet to definitively clarify the scope of vulnerabilities present in DeepSeek’s software; however, the current findings prompt serious caution. As app security becomes a pivotal concern for users, robust encryption practices and stringent adherence to security protocols need to become non-negotiable standards for developers, particularly for applications handling sensitive user information. This incident serves as a stark reminder to remain vigilant amidst growing cybersecurity threats and the responsible management of personal data.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/deepseek-ios-app-exposes-sensitive-data-due-to-encryption-flaws/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Detection Tool Uncovers Widespread Pegasus Spyware Infections Among Diverse Users</title>
		<link>https://techaiconnect.com/new-detection-tool-uncovers-widespread-pegasus-spyware-infections-among-diverse-users/</link>
					<comments>https://techaiconnect.com/new-detection-tool-uncovers-widespread-pegasus-spyware-infections-among-diverse-users/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Thu, 05 Dec 2024 23:46:55 +0000</pubDate>
				<category><![CDATA[iVerify]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Pegasus Spyware]]></category>
		<category><![CDATA[Spyware Detection]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/new-detection-tool-uncovers-widespread-pegasus-spyware-infections-among-diverse-users/</guid>

					<description><![CDATA[In a significant revelation, the mobile device security firm iVerify has reported the detection of seven infections from the notorious Pegasus spyware]]></description>
										<content:encoded><![CDATA[<p>In a significant revelation, the mobile device security firm iVerify has reported the detection of seven infections from the notorious Pegasus spyware within its users&#8217; devices. Released in May, iVerify&#8217;s Mobile Threat Hunting feature, which combines advanced heuristics, machine learning, and malware signatures, has uncovered these findings amid increasing concerns over the prevalence of commercial spyware in today&#8217;s digital landscape.</p>
<p>Historically, commercial spyware, including the infamous Pegasus developed by the NSO Group, was perceived primarily as a tool for targeted surveillance against a small subset of individuals, such as journalists and political activists. However, the latest statistics tell a different story—of 2,500 mobile device scans submitted for inspection, it was those outside the high-profile storytelling of conventional targets who emerged as victims. As iVerify COO Rocky Cole points out, the unexpected target profile includes business leaders and government officials, suggesting a broader scope of surveillance activity.</p>
<p>&#8220;The targeting we uncovered looks a lot more like what you would expect from everyday malware or typical advanced persistent threat (APT) groups rather than a narrow focus on activists,&#8221; Cole commented. &#8220;This cross-section of society being impacted was surprising to us.&#8221;</p>
<p>The seven detected infections, although appearing small in proportion, hint at a much larger issue regarding the widespread use of spyware globally. iVerify&#8217;s detection capabilities, available for both paying subscribers and free app users, might expand the awareness of malware infections among mobile device owners. The tool regularly scans user devices for potential threats and is designed to be user-friendly, providing a detailed analysis in a matter of hours.</p>
<p>Privacy is a core philosophy for iVerify. Even with user emails required for notification purposes if spyware is detected, they maintain a commitment to privacy preservation. The Mobile Threat Hunting feature’s architecture ensures minimal intrusion while enabling effective diagnostics, which is crucial in the fight against spyware.</p>
<p>The findings from iVerify come at a time when public discourse surrounding spyware—particularly Pegasus—has intensified. NSO Group has consistently marketed its products exclusively to vetted intelligence and law enforcement agencies allied with the U.S. and Israel. A spokesperson outlined that these organizations employ such technologies on a daily basis, underlining the professionals&#8217; growing reliance on such tools amidst a perceived uptick in threats.</p>
<p>Matthias Frielingsdorf, iVerify’s vice president of research, is set to present these spying revelations at the Objective by the Sea security conference in Maui, Hawaii. He noted that developing the detection tool entailed considerable investment, recognizing the technical impediments associated with monitoring mobile operating systems that impose tight restrictions compared to traditional desktop environments.</p>
<p>While the tool managed to flag the sophisticated Pegasus spyware in recent scans, it also highlights the challenges within mobile security, particularly in terms of minimizing false positives. For instance, the tool was instrumental in detecting signs of compromise on the smartphone of Gurpatwant Singh Pannun, a Sikh political activist believed to be a target of a foiled assassination attempt.</p>
<p>Cole highlighted the pressing reality of mobile security today, stating, &#8220;The age of thinking that your iPhone or Android phone is secure out of the box is over. The capabilities to determine if your phone has spyware were previously limited. With our tool, we are now exposing a reality that the rate of infection is much higher than people realize.&#8221; </p>
<p>With the growing discourse surrounding privacy and surveillance, iVerify&#8217;s innovative approach may illuminate the broader implications of spyware usage, encouraging businesses and individuals alike to adopt proactive measures in safeguarding their mobile devices against potential hazards. As awareness of commercial spyware grows, tools like iVerify&#8217;s Mobile Threat Hunting are set to become essential in monitoring the integrity of personal and professional communications in an increasingly complex digital terrain.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/new-detection-tool-uncovers-widespread-pegasus-spyware-infections-among-diverse-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
