<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sophie Ross, Author at Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/author/sophie/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/author/sophie/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Thu, 14 Nov 2024 08:11:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Sophie Ross, Author at Tricky Enough</title>
	<link>https://www.trickyenough.com/author/sophie/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>11 Huge Risks to Mobile App Security</title>
		<link>https://www.trickyenough.com/mobile-app-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mobile-app-security</link>
					<comments>https://www.trickyenough.com/mobile-app-security/#comments</comments>
		
		<dc:creator><![CDATA[Sophie Ross]]></dc:creator>
		<pubDate>Thu, 20 Sep 2018 07:50:14 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[App]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[mobile apps]]></category>
		<category><![CDATA[Mobile operating systems]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.trickyenough.com/?p=7471</guid>

					<description><![CDATA[<p>For all of the convenience of mobile apps, security is a major issue. There maybe high-risk to Mobile App Security? As,&#160;There’s an app for everything it seems like. Maps, finances, messages, emails, phone calls, and games are all located on a smart device that almost everyone has in their possession. In short, people are building...</p>
<p>The post <a href="https://www.trickyenough.com/mobile-app-security/">11 Huge Risks to Mobile App Security</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">For all of the convenience of mobile apps, security is a major issue. There maybe high-risk to Mobile App Security?</span></span></p>



<p>As,&nbsp;<span style="font-family: Times New Roman, serif;"><span style="font-size: large;">There’s an app for everything it seems like. Maps, finances, messages, emails, phone calls, and games are all located on a smart device that almost everyone has in their possession. In short, people are <a href="https://www.trickyenough.com/how-to-build-your-first-mobile-application/" target="_blank" rel="noopener">building mobile apps</a> almost for all the things. One would think that security measures would be impenetrable for such devices. However, it is equally convenient and simple for a hacker or anyone else willing to write malicious code to be able to implant such code in a number of ways. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Once this type of code infects a device, it can be transmitted to numerous connected devices. This can instantly give the creator or hacker the ability to steal any personal information that they may think to be important.</span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;"><a href="https://www.trickyenough.com/mistakes-testing-mobile-apps/" target="_blank" rel="noreferrer noopener">Mobile security threats</a> are steadily increasing—according to Symantec research, there was <a href="https://www.symantec.com/security-center/threat-report" target="_blank" rel="noopener nofollow">a 54 percent increase</a> in mobile malware variants over the course of the last year. </span></span></p>



<h2 class="wp-block-heading">Weak Server Security</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">On the server end of apps, weak controls and weak security can lead to apps easily becoming hacked or manipulated. Often these servers operate on smaller security budgets in order to make them either free or easily affordable. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;"><strong>Mobile operating systems</strong> are usually easier to hack than a standard operating system associated with a computer. Android operating systems are often easier to manipulate than other operating systems due to the different types of apps that can be downloaded to their smartphones. Android users can also download apps from different third-party sites which aren’t offered on the standard Android app management platform. By doing this, it is difficult to manage which sites are well-protected, and which sites offer legitimate apps. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">A user may download an app from a server which truly could be a beneficial app, however with weak security, malware can be snuck in as part of the download.</span></span></p>



<h2 class="wp-block-heading">Binary Hardening</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Binary hardening is a type of protection which isn’t incredibly effective. This type of security usually covers very common issues. Such common types of malware or problems aren’t the ones that cause most issues with apps. It allows malware to be installed into apps, which piggyback their way into smart devices. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Once this occurs, it’s very simple for the malware to leak confidential data. Aside from a data leak, malware can also allow other problems that can include fraud and financial theft. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Binary hardening has one main function. Its purpose is to discourage any attempt from a hacker to reuse program code in order to cause problems.</span></span></p>



<h2 class="wp-block-heading">Low-Level Storage Security</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Apps usually don’t have much storage capacity built into them. As a result, they rely on the storage of the consumer. This allows hackers, malware or a virus to gain entrance to personal data that belongs to the consumer. It is from here that all sorts of information can be stolen. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Often, smart device users rely on the storage that their device offers as their main means of storage space. Once malware becomes involved, or once the operating system has been hacked, it becomes very easy to take whatever files are needed from the storage of these devices.</span></span></p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/how-can-we-use-linux-without-installing/" target="_blank" rel="noopener">How to use an Operating System without installing it</a>?</p>



<h2 class="wp-block-heading">Data Leaks</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Critical data is often found at insecure locations. Devices that can access such data are often those that can be used by the public. Even allowing certain apps to control various parts of your smartphone can allow <a href="https://www.trickyenough.com/cloud-computing-and-data-security/" target="_blank" rel="noopener">data leaks</a>. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Every time you download an app, you may be asked if you wish to allow this app to track your location in the background, or even when you aren’t actively using the app. This can easily lead to data leaks.</span></span></p>



<h2 class="wp-block-heading">Authorization issues</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Users make up weak passwords, especially on mobile devices. Most apps require a password, so people use the same passwords for everything. This can grant instant access to anyone who stumbles upon these passwords. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Hackers and malware can then steal usernames, passwords, cookies, locations, date of birth, addresses, social security numbers, credit card numbers, and transaction histories.</span></span></p>



<h2 class="wp-block-heading">Viruses via the App</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Malicious coding, or malware, can enter a smart device through a particular app. This can result in a virus that can be spread between devices. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">It can also result in the spread of malware among devices. Such actions can cause manipulation and <a href="https://www.trickyenough.com/ways-you-stay-safer-online/" target="_blank" rel="noopener">theft of personal data</a>. This could be something as simple as a text-based attack.</span></span></p>



<h2 class="wp-block-heading">Horrible Transport Layer Protection</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">This can include anything that transfers information from devices to the internet. Such modes of transport can include home WiFi and the ability of locals accessing your WiFi. Cell towers also fall into this category. Someone could be intercepting transmissions through WiFi and thereby stealing confidential information in the process.</span></span></p>



<h2 class="wp-block-heading">Improper Handling of Online Sessions</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">When done correctly, sessions are handled rather quickly. If a user is online or interacting with an app for a specified amount of time, the app should continue to work. However, after a short period of inactivity, the app should log the user out. This keeps unintended third parties from gaining access from valuable information. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">If online sessions aren’t handled incorrectly, anyone can log on and have access to all of your information. Financial websites are the most commonly observed subjects to these incidents. However, a hacker can also gain access to your emails, transactions or any other number of personal materials.</span></span></p>



<h2 class="wp-block-heading">Information Disclosure</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Once a hacker gains valuable information about you, they can use this information to continue to gain access to many different databases where you hold additional important information. If a hacker gains just a few small details about you, they can log into various websites that can affect your finances, your business data, your personal information, and so on. </span></span></p>



<h3 class="wp-block-heading"><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Typically, a hacker or malicious software is after one of two things: </span></span></h3>



<ol class="wp-block-list"><li>
<p align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">They are after your identity. By gaining this information, they can act like you, online. They can use your identity in any number of ways. </span></span></p>
</li><li>
<p align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">They are also after your data. By gaining this information, they can make purchases online and have orders charged directly to your account. Someone else can spend as much of your money as they wish to.</span></span></p>
</li></ol>



<h2 class="wp-block-heading">Social Media</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Everyone is incredibly connected in today’s world, with most people actively using social media on a daily basis. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Hackers will send a message that appears to be credible to an unsuspecting user. The user will answer the question without realizing that they are giving some form of information to the hacker. By this time, it’s too late. Sometimes the user will fall for the same scam more than once. <a href="https://www.trickyenough.com/smo-sites-for-search-engine-optimization/" target="_blank" rel="noopener">Social media</a> can also be used to transfer viruses and malware to different places since all social platforms are connected in some way to the internet.</span></span></p>



<h2 class="wp-block-heading">Old Devices</h2>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">In today’s world, technology is constantly changing. Something that is considered new today can be thought of as obsolete within a matter of months. Like smartphones, smart devices and their apps become older, companies have a much harder time keeping their operating systems up to date. This can allow a hacker to use old apps and infect them, gleaning information. As updates come out for apps, they usually include some sort of security update as well.</span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Such data breaches and hacks are very serious. They could cost you or a company huge amounts of money. On average, company data breaches <a href="https://www.businessinsider.com/sc/data-breaches-cost-us-businesses-7-million-2017-4" target="_blank" rel="noopener">cost over $20,000 per day</a> to remediate the damage. </span></span></p>



<p><span style="font-family: Times New Roman, serif;"><span style="font-size: large;">Usually, employees use their smartphones to access information for their businesses. Smartphones are used much more often in today’s time than a personal computer. Most people are able to perform the same tasks on their phone as they would on a computer. In some cases, the phone is much better equipped to handle such tasks. This is <strong>why mobile app security</strong> is of such major importance.</span></span></p>
<p>The post <a href="https://www.trickyenough.com/mobile-app-security/">11 Huge Risks to Mobile App Security</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/mobile-app-security/feed/</wfw:commentRss>
			<slash:comments>8</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7471</post-id>	</item>
	</channel>
</rss>
