11 Mobile Application Security Facts That Will Keep You Up At Night

Mobile application security is hard to get right, we’ve been repeating on every blog. While that much is no surprise to anyone, how bad things actually are, is. In continuation of our efforts to make the Android operating system more secure, we’re exposing 11 Android mobile application security facts that you will lose sleep over. Don’t worry, the idea is to learn from these and take corrective steps so that you can sleep better!

11 Mobile Application Security Facts You Need to Know

11 Facts About Mobile Application Security That Will Keep You Up At Night

 

  • Security lessons are easily forgotten

Security is a difficult topic, also because it naturally clashes with convenience. Thus human nature being what it is, these lessons are easily forgotten even by the likes of Google. A case in point is the Tapjacking vulnerability that existed in Android 4. While it was corrected in Android 6, it was suppressed in 6.0.1, leading to several high-end smartphones being at risk. The lesson here is that even the gatekeepers of security can become lax or get tempted to relax a few barriers. As such, your data's security is as much your responsibility as it is Android's.

  • Your location is very easy to steal

The location feature enables a lot of cool things for apps to do, but also poses it at risk. It is incredibly easy for an app to steal your location. To safeguard yourself, switch off WiFi when it's not in use, and pay careful attention to it when apps request for location permission.

  • The famous E-commerce apps are hopeless

How secure are the e-commerce apps by major companies? You'd think that big brands like them would obviously pay special attention to app security. Alas, they don't. And it's not about clever hacks and rare exploits we are talking about. We conducted an extensive study recently, which revealed that a shocking 95% of global E-commerce apps fail even the most basic security tests. How secure are your transactions, browsing, and data, then?

  • Mobile application security is only getting worse

You will be forgiven to think that as more holes are plugged, mobile application security is getting better by the day. But the reality is completely opposite; in fact, more and more hacks are being uncovered and more apps are infected than ever before. A 2016 mobile application security report by Arxan confirms this: while more people than ever before feel that their apps are more secure, the numbers tell a different story. 90% of the apps Arxan tested for this report contained at least two major vulnerabilities. Looks like the focus everywhere is more on pumping out apps and getting revenue than inspecting what the apps themselves are up to.

Related topic- Man in the Middle attack ( MITM )

  • Organizations are not spending on security

The Arxan report mentioned before has another surprising discovery: 50% of the organizations that participated in their survey had an astonishing budget for security – zero percent! Yes, security is nowhere on the radar of at least half the global leaders, and spending on it is seen as a nuisance. One can only hope it changes soon!

  • Even good apps can leak sensitive data

You don't have to keep an eye only on the malicious apps. The way mobile apps work, even the good ones are liable to leak your personal information when they communicate with their backend servers. This was revealed in a Faloutsos study, described here. This is alarming for the entire Android community, as it highlights that there are things going on in our smartphone that we can't even imagine.

Appknox Appgrader

  • Unused apps are a big security threat

According to Google, 25% apps on the average smartphone lie unused. Unused, however, doesn't mean inactive. Unknown to you, these apps can still start a connection, scan your files and photos, and upload sensitive data to their mother ship. As this blog post by Cheetah Mobile reveals, your phone is most likely already affected by malware. The solution? Remove the apps you don't use at once, especially those that offered free tutorials/wallpapers and have been lying innocently every since.

  • Not updating your Android system is the road to disaster

Let's be honest: nobody likes software updates in Android. The notifications are irritating, the downloads are too large, and the updates take forever to install. Does that mean we should give updates a miss? Absolutely not! The point of releasing an update is just that: critical issues have been found on your device, and the software update aims at patching them up. So what could go wrong if you don't update? Among other things, remote code execution. Certain versions of Android contain a code vulnerability where arbitrary code can be executed on your device. In other words, your device can be made to do just about anything at the attacker's whim.

  • Patterns locks are not foolproof

Pattern locks promote a sense of security that is unmatched. Once we have decided on a pattern and locked the smartphone, we feel that nothing can harm our device. There are several problems with this, however. First, screen lock patterns are awfully common, and it's very likely that you've ended up with one of these patterns. But even worse, our fingers always leave a somewhat oily trail on the touch screen; if you were to look at the pattern against a source a light, later on, the pattern used to lock will be almost visible!

  • Rooting or jailbreaking

While rooting your Android device is a lot of fun and opens many avenues of experimentation, it's also the single biggest security hole in your device. Lack of rooting is not a pernicious feature inflicted by profit-hungry corporations on the common person; rather, an absence of rooting limits the extent of damage that can be caused by an attacker once he has taken control of your device. For instance, reading stored WiFi passwords is not possible on a non-rooted phone, but is a cakewalk in a rooted Android.

Save your adventurous spirit for the biking trips and leave the device alone!

  • The Bluetooth is not innocent

In today's time, the Bluetooth seems to have been forgotten. And so has been the fact that the Bluetooth connection can be on all the time. Does it even matter? For an experienced attacker, it does. Through Bluejacking (also known as Bluebugging), an attacker can use your Bluetooth connection and transfer all kinds of personal and sensitive data without your ever realizing it. Keep the Bluetooth off at all times!

History repeats itself, and application security history repeats more often than necessary. It is up to the community–platform makers, developers, and users to join forces and commit to raising the level of mobile application security.

Conclusion

Hackers these days are always on a lookout for ways to breach into mobile applications and steal sensitive user information. Even the slightest negligence on the part of developers and users gives them a massive opportunity to play their cards. Most of the time, users don't have any idea how seemingly simple things like opening suspicious SMS links, disabling protection, and downloading apps from unknown sources can cause incorrigible harm.

This is why it becomes important for developers and most importantly users to understand the importance of mobile application security and take all the essential measures to secure applications on mobile devices. It's right that these facts about mobile application security are somewhat scary, but it's also true that following the best security practices will ward off these worries in no time.

Make security a priority in your business processes, without additional headcount.

Published on Nov 17, 2018
Harshit Agarwal
Written by Harshit Agarwal
Harshit Agarwal is the co-founder and CEO of Appknox, a mobile security suite that helps enterprises automate mobile security. Over the last decade, Harshit has worked with 500+ businesses ranging from top financial institutions to Fortune 100 companies, helping them enhance their security measures.
Beyond the tech world, Harshit loves adventure. When he's not busy making sure the digital realm is safe, he's out trekking and exploring new destinations.

Questions?

Chat With Us

Using Other Product?

Switch to Appknox

2 Weeks Free Trial!

Get Started Now