Mobile Technology
119.2K views | +1 today
Follow
Mobile Technology
Oportunidades de negocio y nuevas maneras de hacer - Business opportunities and new ways of doing things
Your new post is loading...
Your new post is loading...
Rescooped by Jesús Hernández from The mobile health (salud móvil)
Scoop.it!

The state of mobile app security | Healthcare IT News

The state of mobile app security | Healthcare IT News | Mobile Technology | Scoop.it
View this infographic to see highlights from Arxan's 2014 State of Mobile App Security report.

Via Ignacio Fernández Alberti
more...
No comment yet.
Rescooped by Jesús Hernández from Mobile Application Solutions
Scoop.it!

Mobile Apps Security: Protecting Mobile Devices from Attack

Mobile Apps Security: Protecting Mobile Devices from Attack | Mobile Technology | Scoop.it

Researchers from two German Universities have examined 13,500 popular free apps downloaded from Google’s Play Market and have found that 1,074 (8.0%) have sensitive information such as log-in credentials and personal information/files that are vulnerable to attack.

Apps such as those from American Express, Diners Club, Paypal, bank accounts, Facebook, Twitter, Google, Yahoo, Microsoft Live ID, Box, WordPress, remote control servers, arbitrary email accounts, and IBM have been singled out as being vulnerable.

Mobile apps have emerged as a new cyber-crime attack vector for phishing and malware; we saw the same scenario with web browsers.

 

Read More: http://www.alegix.com/mobile-apps-security-protecting-mobile-devices-from-attack/

 

 


Via Igniva Solutions
more...
michael@orion-sas.co.uk's curator insight, September 23, 2016 5:34 AM
Applications by definition are hackable. Mobile phones are the weakest link in any organisation's or individual's cyber defence.

Applications demand permissions that the owner is often unaware of. For example, your contact list, cameraa voice recorder, emails etc. Why are they allowed to request such draconian permissions from the owner?

Sensitive information, personal data are sought by cyber criminals to sell on the dark web.

Cyber gangs set traps for organisations then sift through all the information they obtain to do with what they will.