Summary is AI-generated, newsdesk-reviewed
  • Zimperium report exposes security flaws in 800 mobile VPN apps, risking privacy and data.
  • 25% of iOS VPN apps violate privacy standards, with outdated OpenSSL prone to Heartbleed.
  • Zimperium urges deeper scrutiny of VPNs in BYOD, highlighting excessive permissions and data misuse.

Zimperium, the pioneer in mobile security, releases new research from its zLabs team revealing alarming weaknesses in mobile Virtual Private Network (VPN) applications.

While VPNs are marketed as essential privacy tools, Zimperium’s analysis of 800 free Android and iOS apps shows that many actually put users, and the enterprises they work for at greater risk.

Among the findings:

  • 25% of iOS VPN apps lacked a valid privacy manifest, violating Apple requirements and leaving users in the dark on how their data is used.
  • 6% requested private entitlements, powerful system-level permissions that should never be accessible to third-party apps.
  • Multiple VPNs shipped with outdated OpenSSL code still exposed to the notorious Heartbleed vulnerability, a flaw disclosed more than a decade ago.
  • Many apps engaged in permission abuse, requesting access to microphones, system logs, or always-on location tracking without justification.
  • Some apps were capable of UI screen capture, giving providers or attackers a surveillance vector well beyond their stated function.

Sensitive data collection

These apps promise protection but instead create new pathways for surveillance, data theft, and exploitation,” said Ignacio Montamat, VP of Security Research, Zimperium, adding “For enterprises with BYOD programs, an insecure VPN isn’t just a consumer problem, it’s an organizational threat that can undermine corporate security at its core.”

Zimperium’s findings also reveal widespread discrepancies between VPN developers’ data practices and their declared privacy policies, with many apps failing to disclose sensitive data collection or misrepresenting their use of system APIs. This lack of transparency leaves end users and IT teams unable to make informed decisions about which apps are safe to trust.

Protecting sensitive enterprise data

Zimperium recommends that enterprises and security leaders take a hard look at the mobile apps allowed in BYOD environments.

With VPNs often treated as “trusted” by default, this research highlights the need for stronger vetting and ongoing monitoring. Visibility into hidden risks from outdated libraries and weak encryption to misleading privacy policies and excessive permissions is critical to protecting sensitive enterprise data and ensuring trust in mobile defenses.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...