The FBI issued a public notice this week that should alert anyone who uses their phone as a digital life center: applications developed outside the United States, and in particular those originating in China, can pose real risks to the privacy and security of personal data. This is not a panic campaign, but a call to caution. on how these applications collect, store and, in some cases, share sensitive information.
In its statement published on the platform of the Internet Crime Complex Center (IC3), the agency recalls that many of the most downloaded and cost-effective applications in the US market are created and maintained by foreign companies. The central point of the notice is that the legal and technical frameworks of other countries can allow the State to access data that, when stored or processed there, are outside the direct control of those who generate them. The FBI states that, according to the privacy policies of several applications, the data collected can reside on servers located abroad and remain there "as long as the developers consider necessary"; in addition, some platforms make their operation conditional on the user accepting wide sharing of that information. The full release can be read on the IC3 website: https: / / www.ic3.gov / PSA / 2026 / PSA260331.

What are the specific risks? The FBI warns about practices observed in various applications that include continuous data collection even when the user has limited the permissions to "only while the app is active," predetermined access to the contact agenda (with names, phones and emails), and storage of identification information on servers that may be subject to national legislation other than American privacy laws. These circumstances increase the possibility of data being used for purposes that users did not explicitly approve.
This notice comes in a political and regulatory context already tense: in parallel to the concerns about data flow, in 2026 an operational restructuring of TikTok in the United States was realized, which sought to avoid a ban by transferring operational control to a joint venture mostly American, he said. Reuters. Episodes like that show that concerns about national security and data are not only hypothetical, but also influence business and legislative decisions.
In explaining why Governments can demand access, experts often point out that many jurisdictions have national intelligence or security standards that enable authorities to seek cooperation from technology companies. This possibility does not necessarily mean that all apps originating in a country are malicious, but it does introduce an additional risk vector that users and organizations should evaluate.
From the practical point of view, there are simple and effective habits to reduce exposure: review and limit permissions consciously, avoid installing applications from unofficial sources, keep the operating system and apps up-to-date, and monitor the unusual behavior of the device or related accounts. It is also worth taking advantage of the tools offered by the platforms to know which data is collected by an app: for example, Apple publishes privacy tags in the App Store and Google requires developers to declare their practices in the "Data Safety" section of Google Play. More information on these tools is available on the official Apple and Google pages: Apple - App Privacy and Google Play - Data safety.
In the area of passwords, the FBI suggests to change them regularly, but security specialists recommend a more modern approach: using a password manager to generate and store unique and robust credentials, and activate the authentication of two factors whenever possible. Among the best known managers are Bitwarden and 1Password, which make it easier to create complex passwords without depending on memory and reduce the risk of reusing credentials.
Not all of the problem is exclusive to specific jurisdictions or companies: the technical architecture of mobile and permissions has evolved to give the user more control, but reality shows that many applications still ask for more access than necessary or collect information with default configurations too permissive. In addition, the way those applications manage data - what they keep, for how long and with whom they share it - is often documented in policies that few read and are not always easy to interpret.
If you suspect that an app has compromised your personal information or detects foreign activity linked to a foreign application, the FBI requests you to report it through the IC3 platform. It is also recommended to log in to important services, check movements in bank accounts and cards, change passwords with a secure manager, and, in case of a relevant impact, consult with the service provider or a cybersecurity professional.

In parallel to individual recommendations, there is a wider debate on transparency and controls: some regulatory proposals are based on independent audits, data location requirements or control structures that avoid State influence on critical global platform operations. Experience shows that technical, legal and commercial solutions must be combined to mitigate risks without cutting innovation or international competition.
In short, the FBI's warning is not an invitation to remove by decree all apps developed outside of the US. But a reminder that we must actively manage our fingerprint. Take simple digital hygiene measures, take advantage of the transparency tools of application stores and use two-factor password and authentication managers significantly reduce risks while decisions on trust and use must take into account the origin of the app, its data policy and the regulatory context where it operates.
For those who need more practical resources on mobile device safety, the CISA provides updated recommendations in its mobile device safety section: https: / / www.cisa.gov / tips / mobile-device-security. And if you think you've suffered an incident, you can report it to the FBI IC3: https: / / www.ic3.gov /.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...