Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 692

Mobile App Permissions

What is Mobile App Permissions?

Mobile App PermissionsThe operating-system controls that require user consent before an app can access sensitive resources such as location, microphone, camera, contacts, photos, SMS, or background sensors.


Modern iOS and Android use runtime permissions and granular consent: an app must call a system API that shows the user a prompt and, in many cases, offers options such as 'Allow Once' or 'Approximate Location'. iOS introduced App Tracking Transparency and Privacy Manifests; Android added scoped storage, photo picker, and the privacy dashboard. Malicious apps abuse permissions by overasking, by requesting the Accessibility Service to read screen content (a common Android banking-trojan tactic), or by chaining low-risk permissions to fingerprint users. Defences: review permissions at install and quarterly, deny background location and Accessibility unless needed, and prefer system pickers that avoid blanket access.

Examples

  1. 01

    An Android trojan asks the user to enable Accessibility, then reads incoming bank OTP SMS in the background.

  2. 02

    An iOS app requests precise location but the user grants only Approximate Location via the system prompt.

Frequently asked questions

What is Mobile App Permissions?

The operating-system controls that require user consent before an app can access sensitive resources such as location, microphone, camera, contacts, photos, SMS, or background sensors. It belongs to the Mobile Security category of cybersecurity.

What does Mobile App Permissions mean?

The operating-system controls that require user consent before an app can access sensitive resources such as location, microphone, camera, contacts, photos, SMS, or background sensors.

How does Mobile App Permissions work?

Modern iOS and Android use runtime permissions and granular consent: an app must call a system API that shows the user a prompt and, in many cases, offers options such as 'Allow Once' or 'Approximate Location'. iOS introduced App Tracking Transparency and Privacy Manifests; Android added scoped storage, photo picker, and the privacy dashboard. Malicious apps abuse permissions by overasking, by requesting the Accessibility Service to read screen content (a common Android banking-trojan tactic), or by chaining low-risk permissions to fingerprint users. Defences: review permissions at install and quarterly, deny background location and Accessibility unless needed, and prefer system pickers that avoid blanket access.

How do you defend against Mobile App Permissions?

Defences for Mobile App Permissions typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mobile App Permissions?

Common alternative names include: App permissions, Runtime permissions.

Related terms

See also