{"id":55159,"date":"2024-01-25T15:04:26","date_gmt":"2024-01-25T15:04:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35447\/iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications.html"},"modified":"2024-01-25T15:04:26","modified_gmt":"2024-01-25T15:04:26","slug":"iphone-apps-secretly-harvest-data-when-they-send-you-notifications","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/","title":{"rendered":"iPhone Apps Secretly Harvest Data When They Send You Notifications"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/834ce9ee7a9ffad7b7083270635b6e9d.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"sc-77igqf-0 fnnahv\">iPhone apps including Facebook, LinkedIn, TikTok, and X\/Twitter are skirting Apple\u2019s privacy rules to collect user data through notifications, according to tests by security researchers at <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.mysk.blog\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.mysk.blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mysk Inc.<\/a><\/span>, an app development company. Users sometimes close apps to stop them from collecting data in the background, but this technique gets around that protection. The data is unnecessary for processing notifications, the researchers said, and seems related to analytics, advertising, and tracking users across different apps and devices. Some of the companies involved said these findings are inaccurate. <\/p>\n<div class=\"sc-1needdh-1 czxCOT\">\n<div class=\"sc-1needdh-0 jLsF instream-native-video instream-permalink instream-native-video--mobile\">\n<div class=\"sc-1h0epat-0 jiQRXG\">\n<div class=\"sc-1wkneyl-4 kDKXjm video-html5-playlist\" data-playlist=\"195665,190397,190876\" data-current=\"195665\">\n<div class=\"sc-1wkneyl-0 hAZDOz video-html5-loaded\">\n<div class=\"sc-1wkneyl-1 jShsAa video-html5-player\">\n<div class=\"sc-lhhce6-0 biVjcq video-html5 autoplay muted mobile\" data-video-id=\"195665\" data-monetizable=\"true\" data-position=\"sidebar\" data-video-title=\" Apple Unveils Its iPhone 15 and Apple Watch Series 9\" data-video-blog-id=\"4\" data-video-network=\"gizmodo\" data-video-duration=\"236\" readability=\"4.5714285714286\">\n<div class=\"sc-lhhce6-2 emBeiF video-top-bar\" readability=\"7\">\n<p> Apple Unveils Its iPhone 15 and Apple Watch Series 9<\/p>\n<\/div>\n<p><video disablepictureinpicture muted playsinline width=\"100%\" height=\"100%\" crossorigin=\"anonymous\" preload=\"none\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/195665\/195665_240p.mp4\" label=\"240p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/195665\/195665_480p.mp4\" label=\"480p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/195665\/195665_720p.mp4\" label=\"720p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/195665\/195665_1080p.mp4\" label=\"1080p\" type=\"video\/mp4\"><track kind=\"captions\" label=\"English\" src=\"https:\/\/kinja.com\/api\/videoupload\/caption\/21161.vtt\" srclang=\"en\"><\/video><\/p>\n<div class=\"sc-1yhvqfu-3 ghtqRH video-controls\">\n<div class=\"sc-1yhvqfu-2 elBHkL\">\n<div class=\"sc-1sfctwm-2 fXTnmP closed-captions-box hide\">\n<div class=\"sc-1sfctwm-1 jglhFk\">\n<div class=\"sc-1sfctwm-0 hbyQRD\">\n<ul>\n<li class=\"selected\" data-label>Off<\/li>\n<li class data-label=\"English\">English<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">It\u2019s par for the course that apps would find opportunities to sneak in more data collection, but \u201cwe were surprised to learn that this practice is widely used,\u201d said Tommy Mysk, who conducted the tests along with Talal Haj Bakry. \u201cWho would have known that an innocuous action as simple as dismissing a notification would trigger sending a lot of unique device information to remote servers? It is worrying when you think about the fact that developers can do that on-demand.\u201d<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">These particular apps aren\u2019t unusual bad actors. According to the researchers, it\u2019s a widespread problem plaguing the iPhone ecosystem. However, spokespeople for Meta and LinkedIn categorically denied the data is used for advertising or other inappropriate purposes. A LinkedIn spokesperson said the data is only used to ensure notifications work properly, and the company follows all of Apple\u2019s developer guidelines. Apple, TikTok, and X\/Twitter didn\u2019t immediately answer Gizmodo\u2019s questions for this article.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">This isn\u2019t the first time Mysk\u2019s tests have uncovered data problems at Apple, which has spent untold millions convincing the world that \u201cwhat happens on your iPhone, stays on your iPhone.\u201d In October 2023, Mysk found that a lauded iPhone feature meant to protect details about your WiFi address <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/twitter.com\/mysk_co\/status\/1717541345223389346&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/twitter.com\/mysk_co\/status\/1717541345223389346\" target=\"_blank\" rel=\"noopener noreferrer\">isn\u2019t as private as the company promises<\/a><\/span>. In 2022, Apple was hit with <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/apple-iphone-privacy-analytics-12-lawsuits-statement-1850077715&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/apple-iphone-privacy-analytics-12-lawsuits-statement-1850077715\">over a dozen class action lawsuits<\/a><\/span> after Gizmodo reported on Mysk\u2019s finding that Apple collects data about its users <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558\">even after they flip the switch on an iPhone privacy setting<\/a><\/span> that promises to \u201cdisable the sharing of device analytics altogether.\u201d<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">The data looks like information that\u2019s used for \u201cfingerprinting,\u201d a technique companies use to identify you based on several seemingly innocuous details about your device. Fingerprinting circumvents privacy protections to track people and send them targeted ads\u2014and Apple explicitly forbids companies from doing it. iPhones and other Apple products have many settings and rules in place that are supposed to give you control over when companies can identify you and collect data.<\/p>\n<p><span class=\"flex-video widescreen\"><span data-chomp-id=\"4ZPTjGG9t7s\" data-recommend-id=\"youtube:\/\/4ZPTjGG9t7s\" id=\"youtube-4ZPTjGG9t7s\" data-recommended=\"false\" class=\"js_recommend\"><\/span><\/span><figcaption class=\"sc-1ptbguh-0 dHvBHx caption\">#Privacy: Facebook, TikTok, and Other Apps Use Push Notifications to Send Data about Your iPhone<\/figcaption><\/p>\n<p class=\"sc-77igqf-0 fnnahv\">For example, the tests showed that when you interact with a notification from Facebook, the app collects IP addresses, the number of milliseconds since your phone was restarted, the amount of free memory space on your phone, and a host of other details. Combining data like these is enough to identify a person with a high level of accuracy. The other apps in the test collected similar information. LinkedIn, for example, uses notifications to gather which timezone you\u2019re in, your display brightness, and what mobile carrier you\u2019re using, the test showed. Mysk said LinkedIn also collects a host of other information that seems specifically related to advertising campaign (a LinkedIn spokesperson called this inaccurate.)&nbsp;It\u2019s worth noting that just because an app can collect this info, doesn\u2019t mean that it is using it.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cWe are not leveraging notifications as a way to collect member data for advertising or related analytics, cross device or cross app tracking,\u201d a LinkedIn spokesperson said. \u201cData that is collected is only used to confirm that a notification was successfully sent and, on a transient basis, to queue the app experience in case the member chooses to launch the app in response to the notification never shared externally.\u201d The spokesperson said the data is never shared externally.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">Meta, which owns Facebook, shared a similar statement. \u201cThe findings aren\u2019t accurate. People log into our app on their device and provide permission to enable notifications,\u201d said Emil Vazquez, a Meta spokesperson. \u201cWe may periodically use this information, even when the app isn\u2019t running, to help us deliver timely, reliable notifications, using Apple\u2019s APIs. This is consistent with our policies.\u201d<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">These details aren\u2019t particularly sensitive compared to things like location data, but they\u2019re valuable for advertising and other purposes. What many people don\u2019t realize is that targeted advertising and other invasions of digital privacy are all about figuring out your identity. Companies know what you\u2019re doing on their apps\u2014but they don\u2019t always know who you are, and data is a lot less useful if you don\u2019t know whose it is. If companies can\u2019t identify you, they can\u2019t target you with ads. <\/p>\n<p class=\"sc-77igqf-0 fnnahv\">Apple provides a special advertising ID number that\u2019s specifically made to facilitate data collection and targeted ads, but settings such as the iPhone\u2019s \u201c<span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/how-apple-s-ask-app-not-to-track-prompt-helped-tiktok-1849772915&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/how-apple-s-ask-app-not-to-track-prompt-helped-tiktok-1849772915\">Ask App Not To Track<\/a><\/span>\u201d control block that ad ID. In theory, that\u2019s supposed to stop companies from tying together information about you and your behavior from different apps and other parts of the internet. But fingerprinting is a sneaky way to keep doing it anyway. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">Apps can collect this kind of data about you when they\u2019re open, but swiping an app closed is supposed to cut off the flow of data and stop an app from running whatsoever. However, it seems notifications provide a backdoor.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\"><span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/developer.apple.com\/documentation\/usernotifications\/unnotificationserviceextension&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/developer.apple.com\/documentation\/usernotifications\/unnotificationserviceextension\" target=\"_blank\" rel=\"noopener noreferrer\">Apple provides special software<\/a><\/span> to help your apps send notifications. For some notifications, the app might need to play a sound or download text, images, or other information. If the app is closed, the iPhone operating system lets the app wake up temporarily to contact company servers, send you the notification, and perform any other necessary business. The data harvesting Mysk spotted happened during this brief window. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cThey can intentionally send a notification to a targeted device just so that the app starts in the background and sends back details,\u201d Mysk said. Or if a company like TikTok or X\/Twitter wanted a quick update on the IP addresses of 100,000 people who have their apps closed, one quick notification is all it would take. \u201cIt\u2019s mind-blowing,\u201d he said. <\/p>\n<p class=\"sc-77igqf-0 fnnahv\">It\u2019s perfectly reasonable that an app might want to analyze how users interact with notifications in order to optimize its services. However, Mysk said there are a few reasons to think that\u2019s not why apps are collecting this data. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">For one, Apple <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/developer.apple.com\/notifications\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/developer.apple.com\/notifications\/\" target=\"_blank\" rel=\"noopener noreferrer\">gives app developers details<\/a><\/span> about what\u2019s going on with notifications directly, so there\u2019s no need to collect additional information if you know what happened after you pinged your users. Furthermore, a lot of the data that apps are collecting seems unrelated to analyzing how well notifications are working, like your phone\u2019s available disk space or the time since your last reboot, Mysk said.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">Beyond that, other data-hungry companies are sending notifications without feasting on all of this other information. When Mysk tested Gmail and YouTube, for example, the apps only collected data that was obviously related to processing notifications. Mysk said if a company like Google can send you a notification without snooping on other details, that suggests there are ulterior motives for the data collection he spotted. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">There are a few potentially innocent explanations for the notifications data problem. For example, developers sometimes leave old code in their apps that performs functions that companies don\u2019t need anymore. It\u2019s theoretically possible that an app like LinkedIn might be set up to collect data that isn\u2019t used for any purposes whatsoever. The researchers, however, said that\u2019s hard to believe.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">There\u2019s an upcoming change to the iPhone operating system\u2019s rules that could improve the situation, but it\u2019s not clear whether it will solve the problem. Starting in Spring 2024, app developers will be <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/developer.apple.com\/documentation\/bundleresources\/privacy_manifest_files\/describing_use_of_required_reason_api&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/developer.apple.com\/documentation\/bundleresources\/privacy_manifest_files\/describing_use_of_required_reason_api\" target=\"_blank\" rel=\"noopener noreferrer\">required to explain<\/a><\/span> why and how they\u2019re using certain \u201cAPIs,\u201d which, in this context, are essentially pieces of software that apps use to communicate with each other and the iPhone operating system.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">In theory, that might force companies to disclose why they\u2019re keeping tabs on you\u2014and if they\u2019re collecting data for illegitimate purposes, maybe they\u2019ll have to stop. \u201cThe bad news is that it is unclear how Apple is going to enforce it,\u201d Mysk said.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">Unfortunately, you might have heard that big companies sometimes tell lies, which would get in the way of that solution, and Apple <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.washingtonpost.com\/technology\/2021\/01\/29\/apple-privacy-nutrition-label\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/01\/29\/apple-privacy-nutrition-label\/\" target=\"_blank\" rel=\"noopener noreferrer\">doesn\u2019t have a stellar track record<\/a><\/span> of enforcing similar rules. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\"><strong><em>Update, 3:16 p.m.:<\/em><\/strong><em> This story has been updated with additional comments from LinkedIn.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35447\/iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55160,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8053],"class_list":["post-55159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyphonespywareapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-25T15:04:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/834ce9ee7a9ffad7b7083270635b6e9d.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"iPhone Apps Secretly Harvest Data When They Send You Notifications\",\"datePublished\":\"2024-01-25T15:04:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/\"},\"wordCount\":1486,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg\",\"keywords\":[\"headline,privacy,phone,spyware,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/\",\"name\":\"iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg\",\"datePublished\":\"2024-01-25T15:04:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,phone,spyware,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyphonespywareapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"iPhone Apps Secretly Harvest Data When They Send You Notifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/","og_locale":"en_US","og_type":"article","og_title":"iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-25T15:04:26+00:00","og_image":[{"url":"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/834ce9ee7a9ffad7b7083270635b6e9d.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"iPhone Apps Secretly Harvest Data When They Send You Notifications","datePublished":"2024-01-25T15:04:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/"},"wordCount":1486,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg","keywords":["headline,privacy,phone,spyware,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/","url":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/","name":"iPhone Apps Secretly Harvest Data When They Send You Notifications 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg","datePublished":"2024-01-25T15:04:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/iphone-apps-secretly-harvest-data-when-they-send-you-notifications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,phone,spyware,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyphonespywareapple\/"},{"@type":"ListItem","position":3,"name":"iPhone Apps Secretly Harvest Data When They Send You Notifications"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55159"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55160"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}