DTX Manchester DTX Manchester
  • About Us
Wednesday, 27 January, 2021
IT Security Guru
CTX Manchester 2020 banner ad
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

US military mining data from Muslim prayer app

There are reports that the US military have been mining data from the prayer app Muslim Pro for 'counterterrorism'

by Jade
November 17, 2020
in Cyber Bites
Quran passage
Share on FacebookShare on Twitter

A report by Motherboard says that the US military has been mining data from the Muslim prayer app, Muslim Pro. Muslim Pro is one of the “most popular Muslim apps”, boasting over 98 million downloads. The app reminds users of their daily prayers and provides them with readings from the Quran. The app also tracks users’ locations with this data sold to brokers. One of the buyers of the app’s data is reportedly the US military, who are using that data supposedly for ‘counterterrorism’.

It is not unusually for apps to sell on their users’ location data to third-party brokers with Muslim Pro being one of the hundreds of apps to do so. The ownership of this specific data by the US military is notable as the US military has consistently targeted predominantly Muslim terror groups in the middle east for a number of years. Therefore, this news has concerned a number of privacy advocates, but the app reports that they keep the users’ data anonymised.

 

0 0 vote
Article Rating
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

COVID-19 vaccine research firms targeted by Russian and North Korean hackers

Next Post

Channel News: Corelight partners with Redington Group to bring powerful open NDR solutions to businesses in the Middle East and Africa

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

Retail giant falls Victim to REvil Ransomware Attack

Retail giant falls Victim to REvil Ransomware Attack

January 27, 2021
an iPad and two generations of iPhone are laid out next to each other, from largest to smallest

iOS 14.4 Released to Fix Three Security Bugs

January 27, 2021
The Hacked and Yet to Be Hacked: SolarWinds Breach Shows Detection is Key to Reducing Risk and Damage

The Hacked and Yet to Be Hacked: SolarWinds Breach Shows Detection is Key to Reducing Risk and Damage

January 27, 2021
Increase in Ransomware Attacks on Healthcare Industry

Increase in Ransomware Attacks on Healthcare Industry

January 26, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept