Trend Micro apologises after Mac apps found scooping up users' browser history  - trend 600 - Trend Micro apologises after Mac apps found scooping up users’ browser history

Trend Micro has confirmed reports that some of its Mac consumer products were silently sending users’ browser history to its servers, and apologised to customers for any “concern they might have felt.”

However, in an advisory on its blog,the well-known internet firm maintained that all collected was “safe and at no point was compromised.”

Furthermore, Trend Micro claims that the data collection was not a secret – as users should have spotted they were agreeing to the data collection when they approved the ’s EULA at installation.

Yeah, because we all know that users read the license agreement when they install software – right?

In its advisory, Trend Micro confirmed researchers’ findings that products such as Dr Cleaner, Dr Cleaner Pro, Dr Antivirus, Dr Unarchiver, Dr Battery, and Duplicate Finder were snaffling users’ browser history, although Trend was at pains to point out that the data collection only occurred once per installation, and did not contain the full browser history:

[The products] collected and uploaded a small snapshot of the browser history on a one-time basis, covering the 24 hours prior to installation. This was a one-time data collection, done for security purposes (to analyze whether a user had recently encountered adware or other threats, and thus to improve the product & service).”

Mac app store   - mac app store 170 - Trend Micro apologises after Mac apps found scooping up users’ browser historyThe discovery of the ’ behaviour resulted in them being kicked out of the Mac App Store (for now at least).

In response to concerns and media reports, Trend Micro says that it has now removed the browser data collection code from its affected consumer products, and deleted any legacy data logs.

But it’s the ’s final statement which caught my eye the most:

Third, we believe we identified a core issue which is humbly the result of the use of common code libraries. We have learned that browser collection functionality was designed in common across a few of our applications and then deployed the same way for both security-oriented as well as the non-security oriented apps such as the ones in discussion. This has been corrected.”

In short, Trend Micro says that the code was designed to help the software determine if users had recently encountered online threats – and yet the code was also incorporated into products which were not security-related.

Dr Battery, for instance, is an app that purports to offer real-time monitoring of your Mac’s battery and determine which apps are draining resources the most. Why on earth would that need to take a gander at your browsing history?

It’s a similar story for Dr Unarchiver which – as its name suggests – allows you to browse, access, and extract files within archive formats. Nothing to do with adware, , or which websites you’ve been visiting.

Dr unarchiver  - dr unarchiver - Trend Micro apologises after Mac apps found scooping up users’ browser history

Dr Unarchiver

Other software manufacturers should a lesson from this incident. Not only should you be sure to get positive agreement from your users as to what private data you may extract from them (and not hide it away in a EULA), but also you need to be careful to not be fattening up your different products with unnecessary code.

Shared code libraries that aren’t actually required by a program to perform its function increase the surface, introduce security and privacy vulnerabilities that could impact your customers, and – potentially – give more opportunities for hackers to strike.

- aa9ea0686c5d1aa9086d4b12c3aa05f2 s 80 d mm r g - Trend Micro apologises after Mac apps found scooping up users’ browser history

About the author, Graham Cluley

Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy.

Follow him on Twitter at @gcluley, or drop him an email.

Follow @gcluley





Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here