Almost all mobile apps are vulnerable to malware

Almost all mobile apps are vulnerable to malware

After extensive app testing on Android and iOS, new research from Positive Technologies has revealed that insecure data storage is the most common security vulnerability in all mobile apps. The new mobile app threat and vulnerability report released by the firm in 2019 reveals that critical vulnerabilities are slightly more common in Android apps than their iOS counterparts (43% vs. 38%), but that difference is minimal. , because the security level of mobile applications is low. about the same Positive Technologies research found that insecure data storage was the most common vulnerability and that this vulnerability was found in 76% of mobile applications. If exploited, this flaw could allow hackers to steal passwords, financial information, personal data, and private messages.

Malware threat

Of the vulnerabilities discovered in mobile applications by Positive Technologies, 89% could be exploited by malware. The risk of being infected with malware is reflected in rooted and cluttered devices, although malware can also elevate your privileges. Once installed on the victim's terminal, the malware can request permission to access user data. If permission is granted, malware can return this data to attackers. Leigh-Anne Galloway, Cybersecurity Resiliency Manager at Positive Technologies, explained how smartphone users can protect themselves from insecure data storage and the growing threat of malware, saying: "In 2018, mobile apps were downloaded to the devices of users more than 205 billion times, developers pay close attention to software design to give us a smooth and comfortable experience, and people are happy to install apps.Mobile devices provide personal information, yet an alarming number Most apps are extremely secure and developers don't usually devote their full attention to solving this problem: data theft on a smartphone doesn't usually require physical access to the device." We recommend that users take a close look at apps that require access to phone features or data. If you doubt that an app needs access to do its job properly, deny the request. Users can also protect themselves by being careful not to open unknown links in instant messaging or chat apps, or download apps from third-party app stores. Prevention is better than cure ".