Get the Low Down Before You Download: Exploring the Temu App’s Security Risks

Should you be concerned about your privacy while using the Temu app?

If you were one of the 123.4 million people watching Super Bowl XVIII this year, you probably recall seeing one of Temu’s “shop like a billionaire” commercials. Temu paid for three spots during the game and two post-game ads, with the in-game advertisement costing a reported $21 million.

As a Chinese-owned e-commerce discount store, Temu is competing with the already popular discount store, Shein, which has captured the approval of many American teenagers and their parents because of cost savings. Although not always high-quality, the premise of Shein and Temu is that you can snag trendy pieces without breaking the bank. But cheapness comes at a price. Shein has dealt with several accounts of forced labor accusations. Temu has also been accused of similar actions, but recently, they’ve come under fire for a different type of concern. A cybersecurity concern, that is.

Temu is now the target of several class action lawsuits, one of them claiming that once the Temu app is downloaded, it has access to nearly everything on a user’s phone. This lawsuit alleges that Temu uses malware and spyware to collect user data beyond what’s necessary for an online shopping app. Another lawsuit claims that Temu is careless with user data, failing to enable safe usage and storage of customers’ sensitive data. At this time, Temu denies all allegations.

And while at this point, the lawsuits are pending, and allegations are just that – allegations – it’s important to understand how to identify and mitigate privacy concerns related to any app you download.

Before you download an app from the app store on your phone, do you check the app privacy details?

It’s always a best practice to review the app privacy details in the app description before downloading it. Every time you download an app, you’ll inevitably have to create an account, thereby handing over your name, email, and potentially phone number, but you’ll want to make sure the apps limit it at that, or at least, don’t go far beyond it. Here’s how to check app privacy details before installing apps on your iPhone and Android devices.

It’s also important to audit all the apps already downloaded on your phone. Whether you’re an Apple or Android user, you can easily review and change access to information in your mobile apps. Learn more by visiting one of the following websites:

Recently, I realized my Google app had access to my entire contact list. I immediately went into the settings on my iPhone, chose the Contacts option, and then toggled off the Contacts sync with my Google account.

So, if you learn anything from this article, remember this – be proactive about your app security settings before it’s too late and you realize your information is in the wrong hands.

About Schneider Downs Cybersecurity

The Schneider Downs Cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind. 

Want to be in the know? Subscribe to our bi-weekly newsletter,?Focus on Cybersecurity, at?www.schneiderdowns.com/subscribe

To learn more, visit our dedicated Cybersecurity page. 

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2024 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
8 Key Considerations When Reviewing User Access
SOC 2 Terminology: Vendor vs Subservice Organization vs Subcontractor vs Third Party vs Nth Party
Did Poor Change Management Contribute to the AT&T Wireless and McDonald’s Outages?
Subservice Organizations: Their Role and Impact on Your SOC Report
Allegheny County Marriage License Data Leak May Affect Recent Newlyweds
PCI DSS v4.0 is Here…Are You Ready?
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us
Pittsburgh

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×