Welcome!

News Feed Item

AdaptiveMobile Reveals the Messaging Apps Turning to Growth Hacking to Compete - two apps responsible for over 76% of all invites

AdaptiveMobile, the world leader in mobile security, has seen mobile apps in North America send 8.5 times more invitations per application in the last six months, in a race to gain new users. As part of a new report released today the company has identified the top social, gaming and messaging applications, including Glide, Meow and Tango, that are using an aggressive form of Growth Hacking that makes it difficult for users to opt-out of sending invitations to their contact lists.

Growth Hacking is a method of increasing the user base of an app, which occurs when a user-installed app requests to promote itself by notifying or inviting the user’s contact list by SMS. AdaptiveMobile started tracking the trend and its associated “App-Spam” earlier this year. The issue has become a mainstream problem with Google recently updating the Google Play terms and conditions to include a note that apps must not be involved in “Unsolicited promotion via SMS services.” Apps now have 15 days to comply with this update to regulations.

“It’s common to invite friends to new apps, but this shouldn’t turn into spam,” said Cathal Mc Daid, Head of Data Intelligence & Analytics at AdaptiveMobile. “These apps take this principle above and beyond acceptable limits, subverting communications between friends and contacts.”

As part of its investigation, the Data Intelligence & Analytics team at AdaptiveMobile monitored the most active, popular social and messaging applications in North America between February and March 2014, noting which ones were the most frequent and aggressive in exploiting existing contacts for new memberships through sending App-Spam, and which apps were receiving the most complaints. AdaptiveMobile found the following to be the most aggressive in sending SMS messages to a user’s contact list, while also making it difficult for users to opt-out:

In monitoring the invitations sent during this period, AdaptiveMobile found that Glide sent 57% of the invites, and Tango sent 19.7%. In order of comparison, Glide sent out over 10 times more SMS invites than WhatsApp, an application with low levels of customer complaints, and made it very difficult for users to opt-out of inviting their contact list, leading to the highest number of consumer complaints. Although the Tango app allows users to easily opt-out of inviting contacts when they install the app, it also includes an ‘Invite on Activity’ feature, so when a photo is taken using the app, this leads to more invites being sent, resulting in a significant number of complaints.

“The key to whether an SMS invite is welcome or viewed as spam lies in the application’s user interface,” said Mc Daid. “Making it difficult for users to not send SMS spam invites is one reason behind the high level of App-Spam. This will hurt a company in the long run not only by irritating consumers but, as we’ve seen with last week’s Google announcement, it could also result in having an app being removed from an app store for not complying with terms and conditions.”

AdaptiveMobile has drafted a set of recommendations to ensure that application developers that wish to send invites do it in a manner that won’t lead to messaging abuse and complaints including:

  • Make it easy for a user to not invite All Contacts
  • Do not ask on start-up or during activity to invite All Contacts
  • Do not give an Invite All option
  • Do not pre-select All Contacts to be invited in an invite screen
  • Allow the user to edit the invite text
  • Do not make inviting others via SMS Invites, part of an incentive system (points etc.)

“If an App chooses to send invites, and if this is permitted by the relevant App store and Mobile Operator, then it needs to make sure that safeguards are built into the design to ensure that a user can easily opt-out,” said Mc Daid. “While compiling the report, we alerted all the applications identified as generating excessive invites in our report and shared the research with Google and other industry players. We will continue to work closely with apps developers, app store owners and mobile operators to reduce the amount of App-Spam being generated.”

Notes to editors

To download the full report please visit: http://www.adaptivemobile.com/downloads/messaging-wars-code-of-conduct

About AdaptiveMobile:

AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on both fixed and mobile networks. With unparalleled expertise and unique focus on network to handset security solutions, AdaptiveMobile’s award-winning security products provide customers with real-time insight into what is happening across their networks. AdaptiveMobile provides its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own security. www.adaptivemobile.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...