Tuesday 10 Mar 2026 Abu Dhabi UAE
Prayer Timing
Today's Edition
Today's Edition
UAE

How to protect yourself from the risks of app permissions

Dr Mohamed Hamad Al Kuwaiti
8 Mar 2026 22:31

By: Dr Mohamed Hamad Al Kuwaiti*

Mobile phones and the applications installed on them, have become an essential part of our daily lives. We rely on them for communication, shopping, entertainment and even managing our finances. However, with every new application we download, we grant it certain permissions to access different parts of our phones or devices.

These permissions may include access to the camera, microphone, contacts, location or even stored photos and files. Leaving such permissions unchecked can pose a significant risk. They are not merely tools designed to enhance user experience; they may also open the door for fraudsters and cybercriminals to spy on users, steal personal data and share information with others without their consent.

To begin with, it is important to understand how these permissions work. When installing an application, the operating system asks users to grant specific permissions. For example, a navigation app requires access to your location to function properly, while a photography app may request access to the camera.

The problem arises when many applications request permissions that exceed what they actually need. If these permissions remain enabled without review, the application can continuously collect your data. Imagine a seemingly harmless application, such as a mobile game, that is capable of reading your text messages or recording your calls. This is not merely hypothetical; numerous cases have emerged in which users discovered that popular applications were spying on them through such permissions.

Fraudsters can exploit these permissions to gain access to sensitive information. For instance, if you grant an application access to your microphone, it may be able to listen to your conversations without your knowledge.

In more advanced cases, attackers use techniques such as malware hidden within applications to activate these permissions in the background. In 2025, cyberattacks exploiting application permissions for espionage reportedly increased by 40%, particularly with the spread of artificial intelligence technologies that have made voice analysis easier. Such surveillance is not merely a violation of privacy; it can also lead to identity theft or even blackmail.

Moreover, these permissions can enable direct data theft. If an application has access to your contacts or photos, it can copy them and send them to external servers. Fraudsters often sell such data on the black market, where it can be used for various criminal purposes. Many applications also share user data with third-party companies for advertising purposes. If you do not regularly review your settings, you may find yourself receiving targeted advertisements based on your location or personal habits.

The risks, however, go beyond advertising. Fraudsters can use this information to design highly targeted scams. For example, if they know your location through an application, they may send fraudulent messages that appear credible, such as: "Your car has won a prize in a competition in your city!" By using personal data, scammers make their schemes far more convincing. With the advancement of artificial intelligence, it has even become possible to create fake voice messages or videos based on stolen data.

Despite these risks, effective measures can significantly reduce exposure to such threats. The most important step is to regularly review application permissions before granting them. It is also advisable to use trusted security applications that can detect malicious software, analyse permissions and warn users about excessive access requests. In addition, regularly updating the operating system is essential, as updates often include security patches that prevent vulnerabilities from being exploited.

Equally important is changing unsafe online behaviours, particularly downloading applications from unofficial sources. Users should review ratings and feedback before installing unfamiliar applications, use strong passwords and enable two-factor authentication for accounts linked to applications. It is also crucial to be cautious of applications that request access to sensitive personal data.

Ultimately, awareness remains the first and most effective line of defence. As technology continues to evolve, users must remain vigilant. Digital privacy is a fundamental right, and by adopting safe practices, we can protect ourselves and our families from a wide range of cyber risks while continuing to benefit from technology safely.

*Head of Cyber Security for the UAE government 

Copyrights reserved to Aletihad News Center © 2026