When we talk about threats to our mobile devices, we almost always associate them with phishing attempts or similar attacks, but apps also pose a certain risk, especially on Android. Where it is possible to download an APK from practically anywhere and end up installing it on our mobile with relative ease. The problem comes when one of the main trusted sources that we have within the Android ecosystem also frequently reports that its controls have been bypassed by some developments, which hide some type of malicious code or security flaw inside. As is the new case that, too again, we have come to know again thanks to the Check Point researchers. If you have them installed, delete them. The threat that this security company has just discovered has more to do with a common security flaw that has caused the massive leakage of data from the users who have downloaded them. Practically the entire list of personal information that we have used to identify ourselves in them has ended up in files that were later leaked to the network, with the danger that this entails. These information leaks (more than 100 million documents, according to Check Point) are not problematic in themselves but they can have future consequences, by putting relevant data on who we are and what mail services, telephones, in the hands of cybercriminals. etc. can be assigned to our identity. And we don’t want to tell you anything if we are reckless in including personal identification numbers and any other similar official document. In that leak that four Android apps hosted on the Google Play Store have suffered (so far as it is known), photos, passwords and even locations through which the device has passed while we have used it also appear. In total, experts believe that the affected apps exceed 100 million downloads worldwide. Now, what to do when faced with a problem like this? The first thing is to better control the data we enter. Even in those cases of apps that are not relevant, resort to information that is not entirely real (total, what difference does it make!) But if it is not your case, the important thing is to be very careful from now on how you navigate and You access your personal services, prioritizing two-step verifications wherever you can.