Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: You Talkin’ to Me?

      September 20, 2025

      The Psychology Of Trust In AI: A Guide To Measuring And Designing For User Confidence

      September 20, 2025

      This week in AI updates: OpenAI Codex updates, Claude integration in Xcode 26, and more (September 19, 2025)

      September 20, 2025

      Report: The major factors driving employee disengagement in 2025

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The attack on the npm ecosystem continues

      September 20, 2025
      Recent

      The attack on the npm ecosystem continues

      September 20, 2025

      Feature Highlight

      September 20, 2025

      SVAR React Core – New UI Library with 20+ Components

      September 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025
      Recent

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Think Before You Download: UAE Cybersecurity Council Issues Warning on Unverified Apps

    Think Before You Download: UAE Cybersecurity Council Issues Warning on Unverified Apps

    August 5, 2025

    UAE Cybersecurity Council

    To protect digital privacy, the UAE Cybersecurity Council has issued a strict warning against the use of unofficial and unverified mobile applications. The UAE Cybersecurity council advisory highlights the surge in cyber threat posed by such mobile apps, which often serve as tools for surveillance, data theft, and unauthorized access to personal information including photos, conversations, and files.

    The Council emphasized that the public must avoid downloading software from untrusted sources. Instead, users should stick to official app stores and carefully review the permissions requested by applications before installation.

    This initiative by UAE Cybersecurity council is part of an effort by the UAE to strengthen its digital resilience amid a growth in cyber threats across the region.

    UAE Cybersecurity Council Took Social Media to Create Public Awareness

    To spread the message among the masses, the UAE Cybersecurity Council has taken to social media platforms like LinkedIn and X (formerly Twitter), urging people to adopt safe digital habits. One of its LinkedIn posts read:

    “We urge everyone to stay cautious when receiving messages, calls, or downloading software from unknown sources. These could be phishing attempts or scams. We work closely with Abu Dhabi Police and other specialised authorities to monitor reports through official channels. We emphasise that quick reporting is your best defence against harm.”

    UAE Cybersecurity Council
    Source: X

    Another post accompanied by a short awareness video added:

    “Your digital footprint reveals a lot of information about you. So you rule over it! Protect your data and browse the web securely to enhance your privacy. Remember that every login leaves a digital trail.”

    The Council also tweeted:

    “Don’t expose your personal information! Strengthen your cybersecurity by taking control of the information you share online. Protect your digital privacy to avoid cyber attacks.”

    UAE Cybersecurity Council
    Source: X

    This digital awareness campaign highlights the Council’s concern: the increasing digital footprint of individuals, which makes them vulnerable to fraud, identity theft, and a wide range of cybercrimes.

    Council Advises Users to Adopt Following Best Practices

    One of the central messages of the UAE Council’s advisory is the importance of app permission management. While some permissions are necessary for apps to function properly, others may be excessive or completely unrelated to the app’s core purpose, which can open doors for exploitation.

    The UAE Cybersecurity council advised users to adopt the following practices:

    • Routinely check and adjust app permissions.
    • Limit access to the camera, microphone, and location services unless necessary.
    • Avoid granting apps access to contact lists unless essential.

    Such smart permission management, the Council noted, can significantly reduce the risk of unauthorized access and misuse of personal data.

    Misleading Content and Phishing Traps

    The Council also urged caution when dealing with online messages or links designed to provoke curiosity. Messages that say “Breaking News: Click the link” or “Watch this exclusive video” are often part of phishing campaigns or malware traps.

    The public is encouraged to:

    • Verify the source of headlines and news articles before clicking.
    • Be suspicious of vague or overly dramatic messages.
    • Avoid interacting with content that lacks clarity or comes from unknown sources.

    The Council cautioned that some misleading content is now being generated using artificial intelligence, making it even more difficult to distinguish between genuine information and fake news.

    Adopt Safe Online Shopping Practices

    With the rise of e-commerce, the UAE Cybersecurity Council also addressed online shopping safety. Shoppers are advised to only purchase from secure websites, those with HTTPS in the URL and a padlock symbol in the address bar. It is also important to verify the legitimacy of online sellers before entering any personal or financial details.

    To spread cybersecurity awareness across all sectors of society, the UAE Cybersecurity Council continues to promote its national campaign, Cyber Pulse. Now in its second year, the initiative seeks to build a culture of digital responsibility and empower individuals to play an active role in safeguarding their online identities.

    The campaign, supported by the Telecommunications and Digital Government Regulatory Authority (TDRA), includes:

    • Cybersecurity training programs
    • Public awareness drives
    • A virtual cybersecurity academy

    These efforts aim to improve cybersecurity literacy and ensure the public is well-prepared to deal with evolving threats.

    UAE Cybersecurity Market

    Over the past decade, all six states of the Gulf Cooperation Council (GCC) have made significant progress in digital innovation. However, this digital transformation has also brought new vulnerabilities.

    The UAE has been particularly proactive in addressing these issues. Ranked fifth in the Global Cybersecurity Index 2020, the country made a significant leap of 33 positions compared to previous rankings, a clear sign of its commitment to cybersecurity.

    However, the journey has not been without challenges. Following the global shift to remote work, the UAE witnessed a staggering 190% increase in cyberattacks. Among the most damaging are ransomware attacks, which have deeply affected the business community:

    • Over $1.4 million paid in ransoms by various organizations
    • 42% of affected businesses had to shut down
    • 90% were attacked again within months

    With an estimated 200,000 cyberattacks occurring daily in the UAE, the Council reiterated that every citizen is the first line of defence. These statistics highlight the need for continuous public education, strict cyber hygiene practices, and stronger resilience strategies at the individual, corporate, and governmental levels.

    By following cybersecurity best practices, individuals can reduce the risks they face in the digital world.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign
    Next Article SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

    Related Posts

    Development

    The attack on the npm ecosystem continues

    September 20, 2025
    Development

    Feature Highlight

    September 20, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-27531 – Apache InLong Deserialization of Untrusted Data Remote File Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    DomainMOD – manage your domains and other internet assets in a central location

    Linux

    Ghostty DEB Installers Now Available for Ubuntu 25.04

    Linux

    CVE-2025-43854 – DIFY Clickjacking Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-49003 – DataEase Java RCE (Character Conversion)

    June 26, 2025

    CVE ID : CVE-2025-49003

    Published : June 26, 2025, 2:15 p.m. | 49 minutes ago

    Description : DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character “ı” becomes “I” when converted to uppercase, and the character “ſ” becomes “S” when converted to uppercase. A threat actor who uses a carefully crafted message that exploits this character conversion can cause remote code execution. The vulnerability has been fixed in v2.10.11. No known workarounds are available.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-23376 – Dell PowerProtect Data Manager Template Engine Template Injection Vulnerability

    April 28, 2025

    Build a location-aware agent using Amazon Bedrock Agents and Foursquare APIs

    April 21, 2025

    Marktechpost Releases 2025 Agentic AI and AI Agents Report: A Technical Landscape of AI Agents and Agentic AI

    May 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.