The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components.

mobile healthcare apps privacy

Study design showing data collection, static security analysis (MobSF, RiskInDroid, OWASP), and sentiment-based review analysis

How the study worked

The methodology followed three phases: data collection, security and privacy testing, and user experience analysis.

To gather the sample, the team used twenty targeted search terms on Google Play, including healthcare, medical, fitness tracker, and telemedicine. They took the top thirty results for each term and collected metadata such as app IDs, install ranges, and developer names. They ended up testing 272 apps.

The security and privacy phase used three static analysis frameworks for cross-validation. MobSF disassembled each application’s code and looked for unsafe network settings, weak cryptography, exposed activities or services, and poorly configured manifest files. Findings were mapped to CWE identifiers for comparison with known vulnerability classes.

RiskInDroid analyzed 150 of the apps to map declared permissions against actual API calls, identifying undeclared but used permissions that could act as hidden data channels. It also flagged proprietary permissions by comparing entries to the Android Manifest namespace and checking them against MobSF’s API traces.

OWASP Mobile Audit tested 95 apps using static application security testing rules. It searched for issues such as unencrypted local storage, hardcoded credentials, and missing input validation. Each weakness was classified under the OWASP Mobile Top 10 categories to align results with industry standards.

Findings From MobSF

MobSF assigned each app a score based on security weaknesses in permissions, network handling, certificate management, and manifest configuration. Scores ranged from 35 to 60 out of 100, with an average of 47, suggesting widespread weaknesses rather than isolated flaws.

High-risk permissions were frequent. POST_NOTIFICATIONS appeared in 221 apps, CAMERA in 176, WRITE_EXTERNAL_STORAGE in 204, READ_EXTERNAL_STORAGE in 188, and ACCESS_FINE_LOCATION in 146. MobSF also found 529 proprietary or undocumented permissions, usually from third-party SDKs that could access downloads, read device identifiers, or write directly to storage without user awareness.

Network analysis uncovered 22 apps configured to trust all TLS certificates, 42 that allowed unencrypted HTTP traffic, and two that disabled certificate pinning. Cryptographic inspection showed 134 apps vulnerable to the Janus exploit, 58 using SHA1-RSA, and 9 using MD5. Each of these creates openings for interception or tampering with sensitive data.

Results From RiskInDroid and OWASP Mobile Audit

RiskInDroid confirmed that every analyzed app used at least one undeclared permission. Many could send SMS messages, access location data, or alter system settings without explicit consent. More than 100 used account management permissions that could expose user credentials. These permissions often originated from embedded advertising or analytics components.

OWASP Mobile Audit found an average of 44 critical vulnerabilities per app and over 2,000 high-severity issues. Common problems included insecure storage, unvalidated inputs, and weak credential handling. One app contained 299 critical issues, while another exceeded 11,000 high-severity findings. The data suggests that most apps reached users without consistent security testing.

Broader patterns

Users often complained about login failures, password reset errors, and frozen screens. These usability problems tended to occur in the same apps with the weakest security scores, suggesting that poor engineering practices affected both stability and protection.

Across all tools, three trends stood out. First, many developers integrated tracking and advertising libraries that collect more data than necessary. Second, outdated cryptographic algorithms remain common because stores do not enforce minimum standards. Third, default network configurations often remain unchanged, leaving insecure connections active.

The researchers described these as systemic problems caused by fast app deployment, reused code, and limited review during development.

The authors suggest several measures to improve security. App stores could integrate automated scanners such as MobSF and RiskInDroid into submission systems, rejecting apps that fail baseline tests. Developers should use strong encryption, validate certificates, and remove redundant permissions.

Permissions should always match an app’s stated purpose. Undeclared or proprietary ones should trigger review or removal. They also recommend expanding oversight to include wellness apps that collect medical data but fall outside medical regulations.

Source link

Visited 3 times, 3 visit(s) today

Related Article

Meta is killing off Messenger’s Mac app for unknown reasons

Do you use Facebook Messenger on the Mac? Soon, your app’s going to stop working. Meta has announced that its Messenger app for Mac is being killed off entirely. Messenger for Mac will stop working altogether within 60 days Meta has published a support doc that states its Messenger app for Mac is being discontinued.

Can Tesla keep its unparalleled lead in Europe’s EV market?

16 October 2025 Read next The winners of the 2025 Residual Value Awards 15 October 2025 Read next The road ahead: Residual value trends and the next market shift 14 October 2025 Read next Electric UK LCV market marches on as wider declines prevail 13 October 2025 As plug-in hybrid (PHEV) deliveries continue to soar,

OnePlus OxygenOS 16 Launch: 7 New Features Coming to Your Phone

The rollout of Android 16 is well underway.  Every Google Pixel phone since the Pixel 6 has received the update, while many other Android phone makers have already released their own versions.  Next on the list is OnePlus, whose OxygenOS skin is known for its smooth performance, extensive customisation and strong privacy controls. With OxygenOS

World’s first truly free software phone? That’s the FSF’s new ‘long game’

klyaksun/iStock/Getty Images Plus Follow ZDNET: Add us as a preferred source on Google. ZDNET’s key takeaways No one has managed to make a fully free software smartphone. Open-source and free software projects have had limited success. The problem is proprietary tech with no public documentation. The Free Software Foundation (FSF) has unveiled a new initiative

Don’t Tell Anyone, but Here’s How to Lock and Hide Apps on Your iPhone

Sometimes my nephew wants to watch monster truck videos on my iPhone so I’ll pull up a video on YouTube and hand him my phone. But if I get distracted by something else, he’s suddenly looking through my Amazon app and about to buy a monster truck toy — or five. Luckily, Apple lets you lock and

Wi-Fi Mobile Phone Market Evolves with Smart Innovation

Wi-Fi Mobile Phone Market New York, US – October 16, 2025 – The global Wi-Fi Mobile Phone Market is poised for a new era of innovation and expansion, driven by disruptive advancements in AI integration, superior chipset performance, and faster wireless communication standards. According to the latest market report from The Insight Partners, the market

EV Charging Infrastructure Market Growth Outlook: Smart

EV Charging Infrastructure Market Size The latest research report by Straits Research reveals that the Global EV Charging Infrastructure Market is experiencing rapid growth, driven by the accelerating adoption of electric vehicles (EVs) worldwide, government initiatives supporting clean energy, and increasing investments in public and private charging solutions. Enhanced urban mobility, rising environmental awareness, and

Top 6 Work Chat Apps for Small Businesses

Operations Is your small business outgrowing its chaotic group chat? Discover the top 6 work chat apps that bring clarity, accountability, and professionalism. Photo: Zenzap October 16, 2025 But now, you’ve hired more people. You’re juggling more clients and projects. And that once-simple group chat has become a source of chaos. Important files are impossible