Skip to main content

Using Glow to try to get pregnant? You may want to reset your password

glow security flaw screen shot 2016 07 31 at 3 39 59 pm
Image used with permission by copyright holder
Family planning apps have become more popular lately, but as these apps receive more attention, some of them are facing serious criticism. A Consumer Reports investigation has accused fertility app Glow of containing several security flaws. The flaw has since been patched, and Glow confirmed to Digital Trends on Twitter that it hasn’t found any evidence that user data was compromised.

According to the report, investigators were able to access extremely sensitive, personal information about users’ sex lives, miscarriage histories, abortions, and more — all by way of a privacy loophole related to the way Glow lets couples link accounts and share data.

Moreover,the Pregnancy Glow community forums somehow contained personal data like users’ names, email addresses, locations, birthdays, and other health details entered into the app. The Consumer Reports team said that this data was easy to uncover using a free, downloadable security testing app, and was then parsed using an online calculator.

As Consumer Reports noted, “The problem with this is that Glow made it a little too easy to connect accounts: a malicious user could add him- or herself to an account without the [account holder] granting them permission to do so, and have access to some very personal data without her even knowing.”

Following TechCrunch’s initial report of these security flaws, Glow investor and executive chairman Max Levchin took to Twitter to ensure nervous parties that the Glow team had “corrected the potential issues,” and further insisted that there was “no evidence to suggest that any @GlowHQ data was compromised.” The Glow team further noted that it had contacted all its users to reset their passwords, update the app, and re-link the app with their partner’s account.

“We appreciate Consumer Reports bringing to our attention some possible vulnerabilities within our app. The industry only gets stronger with white hats who are looking to protect consumers. Once informed, our team immediately worked to address and correct the potential issues and have since released an updated version of the app,” said Jennifer Tye, Glow’s head of U.S. operations. “We also informed users via email to consider changing their password as an extra precaution.”

Tye concluded, “Of the more than 4 million users across our apps, far less than 0.15 percent of our users could have potentially been impacted, but there is no evidence to suggest that any Glow data has been compromised.”

That said, some might be concerned that Glow was reacting to these reports, rather than proactively looking for potential vulnerabilities themselves.

“We were troubled by the nature and depth of the security problems we discovered,” said Maria Rerecich, Consumer Reports’ director of electronics testing, who oversaw the analysis. “But we were pleased to see how quickly Glow responded to our concerns.”

Article originally written by Lulu Chang. Updated on 8-8-2016 by Malarie Gokey with a response from Glow.

Editors' Recommendations

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
Using Zoom on a Mac? It may be secretly recording your audio
zoom recording audio privacy bug macos zoom1

Over the course of the pandemic, Zoom has gone from an occasionally used video calling app to an essential tool for workers all over the world. Yet according to a number of reports, a Zoom bug may be recording Mac users’ audio without their knowledge.

As reported by The Register, the issue first reared its head in late 2021, when Mac users began noticing that Zoom was recording their microphone audio, even when the app was simply open in the background and not actively conducting a call.

Read more
Your Android 10 smartphone may not be able to call 911 if you use Microsoft Teams
The rear panel of the Google Pixel 3 showing its camera array.

Two weeks ago, a Google Pixel 3 user made a Reddit post detailing a potentially critical bug that prevented him from making a 911 call. Now, Google confirmed that they were able to reproduce the issue on "a small number of devices," implying that the problem is more widespread than initially thought.

Google’s investigation revealed that the issue only manifests if users install Microsoft Teams on devices running Android 10 and above. Also, the issue seemingly occurs when users have installed Microsoft Teams but have chosen not to log in. The company blamed the issue on an "unintended interaction between the Microsoft Teams app and the underlying Android operating system" while adding that they are working with Microsoft to issue a fix.

Read more
Are you using one of these passwords? If so, it’s time for a change
Passwords locked on Mac.

The most common passwords used in 2021 have been revealed, and to call them an embarrassment would be an understatement to say the least.

According to a new report from NordPass, a service that provides a password manager program, a worrying amount of users still rely on extremely weak passwords.

Read more