Software Development

Almost all mobile apps Unprotected to malware

Almost all mobile apps Unprotected to malware

After extensive testing of apps available on both the Android and iOS, a new study from Positive Technologies has revealed that risky data storage has become the most frequent security flaw in all mobile apps.

The firm’s new Vulnerabilities and Risks from Mobile Software 2019 report discovered that although critical vulnerabilities are somewhat more prevalent in Android programs instead of within their iOS counterparts (43% vs 38%), this difference is minimum as the safety level of mobile apps is roughly equivalent.

Favorable Technologies’ research discovered that insecure data storage is the most common vulnerability and this defect is located in 76% of mobile apps.

Android has become even more protected

Major mobile malware campaigns reach 250m downloads

McAfee and LG setup for full-family smartphone security

Malware threat

Of the vulnerabilities found in mobile apps by Positive Technologies, 89 percentage could be manipulated by malware.

The risk of being infected with malware jumps on frozen and jailbroken devices though malware can also elevate privileges by itself. Once installed on a victim’s device, malware may request permission to get user information and if permission is granted, the malware may then send that data back to the attackers.

Cybersecurity resilience lead at Positive Technologies, Leigh-Anne Galloway explained the smartphone consumers can protect themselves out of insecure data storage along with the Expanding malware threat, stating:

” In 2018, cellular apps were downloaded on user apparatus over 205 billion occasions. Programmers pay painstaking attention to application design in order to provide us a smooth and easy experience and individuals gladly install mobile programs and provide personal information. However, an alarming number of apps are seriously insecure, and far less programmer focus is spent on solving that problem. Stealing info from a smartphone usually doesn’t even require physical access to this apparatus.

“We recommend that users have a close look when software requests access to phone functions or information. If you doubt that an application needs access to perform its job properly, diminish the request. Users can also protect themselves from being cautious on not opening anonymous links from SMS and chat apps, rather than downloading programs from third-party app stores.

Written by
Barrett S

Barrett S is Sr. content manager of The Tech Trend. He is interested in the ways in which tech innovations can and will affect daily life. He loved to read books, magazines and music.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Linux Development
Software Development

Linux Development Acceleration for Ubuntu, RedHat, and Fedora

You’re either a Linux fan or you aren’t – either way, you’ll...

Modern Contact Centers
Software Development

Securing the Front Lines: Advanced Cybersecurity for Modern Contact Centers

In the digital age, where customer interactions have moved predominantly online, contact...

Medical Software
Software Development

An Overview of the Most Common Types of Medical Software

Imagine a healthcare system where information flows freely, tasks run smoother, and...

Navigating MVP Development
Software Development

Navigating MVP Development: Strategies, Innovation, and Agile Integration

New products appear on the market every day, and most of them...