- published 4/22/26 9:32 AM •
- updated •
- 5 MIN
CSC Warns about the risks associated with application permissions on mobile
As part of the weekly awareness campaign of the "Cyber Pulse" initiative launched by the Cybersecurity Council (CSC), the Council warned in its weekly awareness message about cyber risks related to application permissions on mobile devices and the dangers of leaving them unchecked. It noted that such permissions may allow fraudsters to spy on users, steal their data, and share their information. The council also stressed that these permissions could expose individuals to various forms of fraud, as the information they provide can be used to design targeted and personalized scam operations.
CSC emphasized that protecting privacy is no longer a complex technical matter limited to specialists, but rather a shared responsibility that falls on every smartphone user. It noted that simple steps taken by users today can provide greater protection for their privacy and personal data, particularly amid the widespread proliferation of applications that request multiple permissions beyond what is actually required for their core functions.
The council further warned that application permissions may, in some cases, become a gateway exploited by fraudsters to spy on users and steal their personal data. Many applications request access to sensitive components of the phone, such as location, the camera, the microphone, or contact lists. If misused, this access may enable the collection of large amounts of personal information that can later be used for fraudulent schemes or extortion.
Despite the risks associated with such permissions, CSC pointed out that a large number of users fall into the trap of granting them automatically without careful review. Recent estimates indicate that around 65% of mobile phone users do not review application permissions after installation, which allows applications to gain access to sensitive data that may not be related to their primary function.
The weekly awareness campaign highlighted location data as one of the most prominent examples. Choosing the "Allow Always" option enables an application to continuously track a user’s movements even when the application is not actively in use. In other cases, some applications request permission to access the microphone or camera, meaning they may have access to these sensitive tools even when the user is not directly using the application.
Contact lists also represent a valuable source of information for fraudsters, as they can be exploited to carry out scams or extortion attempts by reaching out to the victim’s friends or acquaintances, or by using such data in large-scale phishing campaigns. The council reiterated in its weekly awareness message that data indicates approximately 62% of applications request unjustified permissions that could grant access to personal data or essential phone functions without a genuine need.
It added that the risks of excessive permissions go beyond privacy violations and may lead to a range of other digital threats. Every permission granted to an application carries a certain level of risk if misused, potentially resulting in the leakage of personal data, the monitoring of a user’s movements without their knowledge, or even partial control over device functions. In more serious cases, this could lead to direct financial losses or the spread of malware on the device.
CSC emphasized that reducing these risks does not necessarily require complex measures but rather greater digital awareness. Reviewing application permissions regularly, deleting unnecessary applications, and ensuring that apps are downloaded only from trusted sources are among the essential steps to protect personal data.
The council also advised limiting sensitive permissions whenever possible and choosing the "Allow only while using the app" option instead of "Allow always" when applications request access to location services, the camera, or the microphone. Such simple measures, it concluded, can serve as a first line of defense against digital surveillance attempts and data theft, helping users safeguard their privacy in an era of rapidly growing cyber threats.
CSC concluded that cybersecurity has become a major challenge in the digital space and that these preventive measures and responsible behaviors, alongside ongoing government efforts, contribute significantly to addressing current digital challenges arising from rapid technological advancements. In this context, the "Cyber Pulse" awareness campaign, launched by the Cybersecurity Council for the second consecutive year on social media platforms, supports the UAE’s continuous efforts to build a secure cyberspace that protects users from growing digital risks and keeps pace with rapid technological developments. This initiative aligns with a comprehensive national vision aimed at strengthening trust in the country’s digital ecosystem, promoting a culture of cybersecurity, enhancing digital awareness among families and individuals, and reinforcing cybersecurity practices to safeguard the safety and privacy of citizens and residents in an era of accelerated digital transformation.
Summary
More Updates
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council emphasized the importance of digital identity, noting that it is one of the most valuable assets owned by individuals and organizations. The Council highlighted that nearly 97% of cyberattacks target passwords, while around 40% of social media users worldwide have either been compromised or have unintentionally shared personal data. It further warned that the consequences of a digital identity breach extend beyond data loss to include identity theft, fraud, financial losses, and negative impacts on personal and professional reputation. During the first half of the year, indicators also showed a significant increase of 32% in cyberattacks targeting digital identities, amid the growing reliance on digital services and smart applications. To strengthen protection, users are advised not to share sensitive personal information, to use strong and complex passwords, and to enable multi-factor authentication. These steps constitute the first line of defense against growing threats.
Informing
Corporations, Individuals & Families
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council noted that cyber threats have become increasingly complex and widespread, driven by the growing reliance on the internet in various aspects of daily life. More than 750,000 browsing sessions are recorded daily, reflecting the vast scale of digital activity. Each browsing session represents an opportunity for targeting users through malware or fraudulent webpages, especially given the reliance on the internet for financial transactions, government services, and social communication. The Council affirmed that browser security technologies serve as a technical shield that protects users while browsing. These technologies include encryption, isolation, and preventive policies designed to prevent breaches, data leakage, and unauthorized tracking. Key guidelines to enhance browsing security include verifying links before clicking, regularly updating browsers, and avoiding downloads from untrusted sources.
Informing
Corporations, Individuals & Families
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council stressed the importance of regular inspection and cleaning of electronic devices such as mobile phones and personal tablets, noting that these practices can reduce cyber incidents by up to 30%. The Council explained that the accumulation of unnecessary files and data makes it easier for malicious software to infiltrate devices, thereby increasing cyber risks and exposing users to potential data loss or privacy breaches. Key signs that a device may require cleaning include slow performance, unusual messages or recurring errors, full storage capacity, and the presence of unknown or unused applications. Therefore, it is important to adopt a simple digital cleaning routine that can significantly enhance device security. This routine includes using trusted security software, deleting unnecessary files and applications, and regularly updating operating systems and software to address vulnerabilities and enhance performance.
Informing
Corporations, Government, Individuals & Families
Thank You for Staying Informed
Your commitment to staying informed about the latest news in cybersecurity is a significant step toward safeguarding our digital environment.