Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Instagram Unveils New Security Controls for Third-Party Apps

Instagram announced this week that users will have more control over the data they share with third-party applications and websites.

Instagram announced this week that users will have more control over the data they share with third-party applications and websites.

Applications and websites can ask users for permission to access their Instagram photos or connect their accounts. Examples provided by Instagram include apps that help users build websites or ones that allow them to print photos from their social media account.

Since users might give these types of permissions to many apps and websites, it can be difficult for them to keep track of what type of data they share with each service. The new features, which aim to address this issue, will become available in Settings -> Security -> Apps and Websites.

Users will see exactly what they share with a specific app, and they can easily revoke an application’s access if they choose to do so.

Instagram will also introduce a new authorization screen that lists the type of information a third-party app is requesting, and users will be given the option to either “Authorize” the application or “Cancel” access.

New data security controls added to Instagram

The Facebook-owned social media platform says these updates will be rolled out gradually over the next six months.

Advertisement. Scroll to continue reading.

Facebook announced recently that Instagram had been added to its Data Abuse Bug Bounty program, which offers researchers between $500 and tens of thousands of dollars for reports of apps that collect user data and transfer it to a third-party.

Related: Instagram Chief Insists It Doesn’t Spy on Users

Related: Hacker Finds Instagram Account Takeover Flaw Worth $10,000

Related: Instagram Account Takeover Vulnerability Earns Hacker $30,000

Related: Instagram Says Not Source of Contact Info for Influential Users

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.