Thursday, 19 November 2015

MOBILE APP AND SECURITY THREATS



Mobile applications no doubt, are one of the fastest growing application software in the 21st century, owing to the sophistication of internet enabled mobile phones and tablets in the world today. To this end, institutions, enterprises and organizations are developing mobile apps in order to reach their target audience or sell their goods and services faster and easier.   Some mobile apps are developed without going through the appropriate procedures i.e applying security  measures during development of the mobile app; hence they are easily hijacked by criminals or vulnerable to all sorts of virus. There aren't any policies or standards policing mobile application development so security flaws are often overlooked when developers don't take the time to review their product. The rush to release approach as the leading source of mobile application threats and vulnerabilities. When an app's development is rushed, it's typically due to customer demand and developer impatience. Implementing security checks and controls for mobile apps can add an average of six weeks to the application development process, and it can take even longer depending on what is found.
Most users may often assume that the mobile apps they download are safe, more than 50% of developers surveyed in a new report admitted to using "shortcuts or temporary solutions" to produce their app faster. The survey showed that nearly 300 mobile app developers and more than 400 consumers illustrated a lack of focus on security during the development process. That lack of focus, along with development shortcuts and common coding errors are creating so many mobile application threats that expert believes, enterprises and users should simply behave as if their devices have already been hacked.
According to the survey, 79% of developers agreed that mobile apps have become a target for cybercrime because of security flaws, and 74% of developers believed that most enterprise mobile apps are "moderately vulnerable" to mobile application threats. Perhaps even more troubling: 96% of developers admitted to using third-party software frameworks that were potentially unsecure.
By rushing their products to the market, experts said, these apps are not secure or ready for public consumption. In addition to a lack of basic security controls and privacy policies, many mobile apps contain glaring mistakes that make them vulnerable to attacks. For example, Kostka, an expert in cyber security, and CEO of Bluebox Security, said two of the more common errors developers often make are exposing the API keys in their apps or leaving their developer menus behind in the code.
Kostka said BYOD security is an issue for all devices and operating systems, and enterprises shouldn't put faith in the OS to protect their data. "We're seeing so many more attacks on iOS devices because it's the most popular platform for enterprises," she said. "You can't just trust the OS. Apple has done a lot of good things with security, but it's not 100% secure. And people think an iOS device has to be jailbroken to be at risk, but that's not true."
All of this adds up to major problems for companies, especially those who have BYOD policies, Kostka said. Using employee-owned mobile devices in the workplace is generally encouraged; however, this means companies have to educate employees about mobile application threats and proper security hygiene. If employees are careless or have insecure mobile apps on their devices, their employer can potentially suffer a breach or theft of sensitive data. Since companies don't have complete control of employees using their own devices for work, company data is at risk.
Bluebox Security which will be available in December is addressing these issues with a new software product called Bluebox for Consumer Apps, which is designed to improve BYOD defenses. The mobile security startup already offers protection for enterprise iOS and Android apps, but Bluebox for Consumer Apps focuses on the non-enterprise applications that often reside on BYOD devices in the enterprise and transforms them into "self-defending apps." Any application available in the Apple App Store or Google Play Store can be uploaded to Bluebox for Consumer Apps, which then applies an application wrapper to the mobile app. The wrapper provides encryption for data at rest, enterprise security policies, anti-tampering measures, mobile threat intelligence and other capabilities. BlueBox said the application wrapping process is simple and requires just a single click, which won't add additional time to the application development cycle. "Time to market is crucial for mobile app developers," she said. "Your app could become irrelevant during that six weeks."
Kostka said most enterprises know that mobile app development falls short on security, but they're not taking enough action to properly protect those apps. "Companies have underinvested in mobile security in a rush to become mobile first, and now the bill is due," she said. "With mobile threats being discovered almost daily, and enterprises losing control over consumer devices, it's only a matter of time before a mobile hack is the root of the next major breach."

No comments:

Post a Comment