Almost all mobile apps Unprotected to malware

Almost all mobile apps Unprotected to malware

Almost all mobile apps Unprotected to malware

After extensive testing of apps available on both the Android and iOS, a new study from Positive Technologies has revealed that risky data storage has become the most frequent security flaw in all mobile apps.

The firm’s new Vulnerabilities and Risks from Mobile Software 2019 report discovered that although critical vulnerabilities are somewhat more prevalent in Android programs instead of within their iOS counterparts (43% vs 38%), this difference is minimum as the safety level of mobile apps is roughly equivalent.

Favorable Technologies’ research discovered that insecure data storage is the most common vulnerability and this defect is located in 76% of mobile apps.

Android has become even more protected

Major mobile malware campaigns reach 250m downloads

McAfee and LG setup for full-family smartphone security

Malware threat

Of the vulnerabilities found in mobile apps by Positive Technologies, 89 percentage could be manipulated by malware.

The risk of being infected with malware jumps on frozen and jailbroken devices though malware can also elevate privileges by itself. Once installed on a victim’s device, malware may request permission to get user information and if permission is granted, the malware may then send that data back to the attackers.

Cybersecurity resilience lead at Positive Technologies, Leigh-Anne Galloway explained the smartphone consumers can protect themselves out of insecure data storage along with the Expanding malware threat, stating:

” In 2018, cellular apps were downloaded on user apparatus over 205 billion occasions. Programmers pay painstaking attention to application design in order to provide us a smooth and easy experience and individuals gladly install mobile programs and provide personal information. However, an alarming number of apps are seriously insecure, and far less programmer focus is spent on solving that problem. Stealing info from a smartphone usually doesn’t even require physical access to this apparatus.

“We recommend that users have a close look when software requests access to phone functions or information. If you doubt that an application needs access to perform its job properly, diminish the request. Users can also protect themselves from being cautious on not opening anonymous links from SMS and chat apps, rather than downloading programs from third-party app stores.

Post a Comment