Software Development

Almost all mobile apps Unprotected to malware

Almost all mobile apps Unprotected to malware

After extensive testing of apps available on both the Android and iOS, a new study from Positive Technologies has revealed that risky data storage has become the most frequent security flaw in all mobile apps.

The firm’s new Vulnerabilities and Risks from Mobile Software 2019 report discovered that although critical vulnerabilities are somewhat more prevalent in Android programs instead of within their iOS counterparts (43% vs 38%), this difference is minimum as the safety level of mobile apps is roughly equivalent.

Favorable Technologies’ research discovered that insecure data storage is the most common vulnerability and this defect is located in 76% of mobile apps.

Android has become even more protected

Major mobile malware campaigns reach 250m downloads

McAfee and LG setup for full-family smartphone security

Malware threat

Of the vulnerabilities found in mobile apps by Positive Technologies, 89 percentage could be manipulated by malware.

The risk of being infected with malware jumps on frozen and jailbroken devices though malware can also elevate privileges by itself. Once installed on a victim’s device, malware may request permission to get user information and if permission is granted, the malware may then send that data back to the attackers.

Cybersecurity resilience lead at Positive Technologies, Leigh-Anne Galloway explained the smartphone consumers can protect themselves out of insecure data storage along with the Expanding malware threat, stating:

” In 2018, cellular apps were downloaded on user apparatus over 205 billion occasions. Programmers pay painstaking attention to application design in order to provide us a smooth and easy experience and individuals gladly install mobile programs and provide personal information. However, an alarming number of apps are seriously insecure, and far less programmer focus is spent on solving that problem. Stealing info from a smartphone usually doesn’t even require physical access to this apparatus.

“We recommend that users have a close look when software requests access to phone functions or information. If you doubt that an application needs access to perform its job properly, diminish the request. Users can also protect themselves from being cautious on not opening anonymous links from SMS and chat apps, rather than downloading programs from third-party app stores.

Written by
Barrett S

Barrett S is Sr. content manager of The Tech Trend. He is interested in the ways in which tech innovations can and will affect daily life. He loved to read books, magazines and music.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

CapCut alternatives
Software Development

7 Best CapCut Alternatives for Video Editing

If you’ve used CapCut to make videos and then suddenly you’re asking,...

Twitter Video Tools
Software Development

5 Best Twitter Video Tools for Content Creators

The best Twitter video tools can enhance the quality of your videos...

Tools for Curriculum Strategy
Software Development

5 Most Effective Technological Tools for Curriculum Strategy in Universities

Devising a relevant and well-rounded curriculum that meets students’ dynamic learning needs...

Co-Development Software
Software Development

What Is Co-Development Software? How to Implement It

In the ever-changing world of software and technology, co-development has become the...