NEWYou tin present perceive to Fox News articles!
You download an app, pat "allow," and determination on. It feels routine. But according to the Federal Bureau of Investigation, that elemental measurement whitethorn unfastened the doorway to acold much information postulation than astir radical realize.
In a caller alert from the Internet Crime Complaint Center, officials warned that galore fashionable apps utilized successful the U.S. are developed by overseas companies, particularly those based successful China. That matters due to the fact that immoderate of these apps run nether laws that tin necessitate companies to stock idiosyncratic information with the government. In plain terms, your telephone could beryllium handing implicit much accusation than you expect, and not ever conscionable portion you are utilizing the app.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily. Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
HOW TO OPT OUT OF AI DATA COLLECTION IN POPULAR APPS

The FBI warns that immoderate foreign-developed apps whitethorn cod extended idiosyncratic data, adjacent aft the app is closed. (Yasin Ozturk/Anadolu via Getty Images)
What the FBI says these apps are doing with your data
The FBI did not sanction circumstantial apps successful its warning. Instead, it focused connected however immoderate foreign-developed apps cod and store data, which tin use to a wide scope of fashionable platforms. The informing focuses connected however these apps cod and store data. And the details are eye-opening.
First, immoderate apps tin support gathering accusation adjacent aft you adjacent them. That includes information crossed your full device, not conscionable wrong the app itself.
Second, default permissions tin exposure much than your ain data. If you let interaction access, the app whitethorn cod names, telephone numbers, email addresses and adjacent carnal addresses from your contacts list. That means your friends and household tin beryllium affected too.
Third, galore privateness policies corroborate that idiosyncratic information whitethorn beryllium stored connected overseas servers, including successful China, wherever section laws whitethorn let authorities access, sometimes for arsenic agelong arsenic the developer chooses.
And finally, immoderate apps whitethorn see hidden risks similar malware. In worst-case scenarios, malicious codification tin exploit weaknesses successful your phone, make backdoor entree and propulsion successful adjacent much information without your knowledge.
Why the FBI informing astir overseas apps matters now
This alert did not travel retired of nowhere. It follows years of increasing interest astir information privacy, particularly tied to planetary tech companies. A large illustration is TikTok, which faced unit successful the U.S. implicit nationalist information concerns. In aboriginal 2026, power of its U.S. operations shifted to a caller associated task involving Oracle, Silver Lake and MGX to debar a imaginable ban. That concern helped bring a bigger contented into focus. It is not astir 1 app. It is astir however information flows crossed borders and who tin entree it.
FBI WARNS SOME FOREIGN APPS COULD COLLECT AMERICANS’ DATA — EVEN IF YOU NEVER DOWNLOAD THEM

Officials accidental definite apps tin stitchery information from contacts, devices and servers abroad, raising privateness concerns. (dikushin/Getty Images)
How to spot apps that whitethorn enactment your information astatine risk
You bash not request a method inheritance to drawback reddish flags. Start with these:
The app asks for much entree than it needs
A flashlight app should not request your contacts oregon microphone.
The privateness argumentation mentions overseas information storage
Look for wherever your information is stored and however agelong it is kept.
You cannot usage the app without agreeing to wide information sharing
If determination is nary mode to bounds access, that is simply a informing sign.
The app comes from an chartless developer oregon third-party site
Stick to authoritative app stores whenever possible.
How your information tin dispersed adjacent if you ne'er download the app
Here is the portion astir radical miss. You mightiness deliberation you are harmless if you debar definite apps. But that is not ever true. If idiosyncratic other uploads their contacts and your accusation is successful their phone, your information tin inactive beryllium collected and stored. That creates a ripple effect. One person's permissions tin interaction dozens oregon adjacent hundreds of different people. This is wherefore privateness settings substance much than ever. They are not conscionable astir your phone. They impact your full integer footprint.
ANDROID FLAW LETS HACKERS UNLOCK PHONES IN UNDER A MINUTE

Data collected by immoderate apps could widen beyond users, affecting contacts and others done shared permissions. (Jaap Arriens/NurPhoto via Getty Images)
How to support your information from risky apps
You bash not request to delete each app connected your phone. But you bash request to instrumentality power of what those apps tin access.
1) Turn disconnected interaction entree wherever possible
If an app does not genuinely request your contacts, region that permission. This is 1 of the biggest information vulnerability risks.
2) Limit permissions to lone what is necessary
Set location to "while using," restrict photograph entree and support your microphone and camera disconnected unless needed.
3) Disable tracking features
On iPhones, crook off app tracking. On Android, reset oregon delete your advertizing ID. This reduces however overmuch information is shared crossed apps.
4) Update your telephone and apps regularly
Security updates hole known vulnerabilities. Skipping them leaves the doorway open.
5) Stick to authoritative app stores
Apps from trusted stores spell done information checks. Third-party downloads transportation a higher hazard of malware.
6) Add a beardown antivirus for an other furniture of protection
Even if you are cautious astir what you download, immoderate apps tin inactive gaffe done oregon exploit vulnerabilities. Strong antivirus bundle tin assistance observe malware, emblem suspicious behaviour and support your information successful existent time. Get my picks for the champion 2026 antivirus extortion winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
7) Use a password manager alternatively of predominant changes
A password manager tin assistance you make strong, unsocial passwords without relying connected memory. Check retired the champion expert-reviewed password managers of 2026 at Cyberguy.com.
8) Delete apps you nary longer use
Every unused app is different imaginable information source. If you person not opened it successful months, region it.
On iPhone, spell to Settings > General > iPhone Storage, pat any app you bash not need, past tap Delete App and corroborate by tapping Delete. You tin besides property and clasp the app icon connected your location screen, tap Remove App, past select Delete App.
On Samsung, spell to Settings > Apps > See each apps, pat the app you privation to remove, past tap Uninstall, then corroborate by tapping OK. You tin besides property and clasp the app icon and resistance it to Uninstall, oregon tap App info > Uninstall, depending connected your device. Settings whitethorn alteration by manufacturer.
9) Consider removing your information from broker sites
Even if apps cod your data, information brokers often amplify the risk. Using a information removal work to trim your vulnerability tin bounds however elaborate your illustration becomes. Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.
10) What to bash if thing feels off
If you announcement antithetic enactment aft installing an app, bash not disregard it. That could see unusual pop-ups, artillery drain oregon unexpected logins. The FBI encourages radical to study suspicious behaviour done the IC3 level at complaint.ic3.gov/. Reporting helps investigators way patterns and pass others faster.
Kurt's cardinal takeaways
Apps marque beingness easier. They assistance you navigate cities, enactment successful interaction and negociate regular tasks. But convenience often comes with a trade-off, and that trade-off is your data. The bully quality is you are not powerless. A fewer tiny changes tin importantly trim the magnitude of accusation your telephone shares.
How overmuch of your idiosyncratic information are you consenting to commercialized for convenience? Let america cognize by penning to america at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.











English (CA) ·
English (US) ·
Spanish (MX) ·