Software Development

Almost all mobile apps Unprotected to malware

Almost all mobile apps Unprotected to malware

After extensive testing of apps available on both the Android and iOS, a new study from Positive Technologies has revealed that risky data storage has become the most frequent security flaw in all mobile apps.

The firm’s new Vulnerabilities and Risks from Mobile Software 2019 report discovered that although critical vulnerabilities are somewhat more prevalent in Android programs instead of within their iOS counterparts (43% vs 38%), this difference is minimum as the safety level of mobile apps is roughly equivalent.

Favorable Technologies’ research discovered that insecure data storage is the most common vulnerability and this defect is located in 76% of mobile apps.

Android has become even more protected

Major mobile malware campaigns reach 250m downloads

McAfee and LG setup for full-family smartphone security

Malware threat

Of the vulnerabilities found in mobile apps by Positive Technologies, 89 percentage could be manipulated by malware.

The risk of being infected with malware jumps on frozen and jailbroken devices though malware can also elevate privileges by itself. Once installed on a victim’s device, malware may request permission to get user information and if permission is granted, the malware may then send that data back to the attackers.

Cybersecurity resilience lead at Positive Technologies, Leigh-Anne Galloway explained the smartphone consumers can protect themselves out of insecure data storage along with the Expanding malware threat, stating:

” In 2018, cellular apps were downloaded on user apparatus over 205 billion occasions. Programmers pay painstaking attention to application design in order to provide us a smooth and easy experience and individuals gladly install mobile programs and provide personal information. However, an alarming number of apps are seriously insecure, and far less programmer focus is spent on solving that problem. Stealing info from a smartphone usually doesn’t even require physical access to this apparatus.

“We recommend that users have a close look when software requests access to phone functions or information. If you doubt that an application needs access to perform its job properly, diminish the request. Users can also protect themselves from being cautious on not opening anonymous links from SMS and chat apps, rather than downloading programs from third-party app stores.

Written by
Barrett S

Barrett S is Sr. content manager of The Tech Trend. He is interested in the ways in which tech innovations can and will affect daily life. He loved to read books, magazines and music.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Software Quality Assurance
Software Development

What is Software Quality Assurance (SQA)? A Complete Guide

Software quality assurance (SQA) is an integral component of software development processes....

Best ERM Software
Software Development

5 Best ERM Software Options in 2025

The right enterprise risk management (ERM) software can help organizations in growth...

E-Portfolio Platforms
Software Development

5 Leading E-Portfolio Platforms for Student Learning Assessment

Student learning assessment is one of the biggest challenges educators face. Evaluating...

Resource Breakdown Structure
Software Development

What is a Resource Breakdown Structure? A Complete Guide for Project Managers

Planning a complicated project without proper organization of resources is like trying...