BYOD Mobile App Developer

What Can We Do as Mobile App Developers in This BYOD Era?

Today we live in a mobile environment. There are more mobile devices connected to the Internet than human beings in the world. This has given us more freedom to choose to work from anywhere, anytime and given us the flexibility to take care of other important matters.

The question is: Are we prepared for that?

These are facts taken from recent research undertaken by Arxan:

  • 97% of the top 100 paid apps on the Google Android platform have been hacked
  • 56% of the top 100 paid apps for Apple iOS had been hacked
  • 73% of popular free apps on Android had been hacked
  • 53% of popular free apps on Apple iOS had been hacked

The numbers are alarming

Remember that many of these mobile applications are developed by professionals and large teams, perhaps with security experts involved in the development process. Why are they still hacked?
Mobile security is a tricky business and developers are taking it far too lightly. The plethora of hacking tools which are freely available virtually guarantee that poorly protected or unprotected apps will be exploited. All of us need to be more careful when designing and building mobile apps to meet stricter security requirements.

Security in BYOD days

It’s more relevant now in the Bring Your Own Device (BYOD) era. Almost every company wants to ride the tech wave and allow their employees to bring their own mobile devices to enhance both the business and employee productivity. While this represents a big opportunity for all of us, without proper approach to security, it brings even more risks. According to OWASP, some of the top mobile security risks relate to broken cryptography, weak server side control and insufficient transport layer control.

The consequences

Broken cryptography can result in unauthorized retrieval of sensitive information from the mobile device which has different business impacts.

  • Typically it results in information or code theft, privacy violation and reputation damage
  • Insufficient transport layer control leads to identity or account theft which in turn makes the business vulnerable to fraud
  • Weak server side means that through the mobile interface, hackers are able to feed malicious inputs or unexpected sequences of events to the vulnerable endpoint

And for the company as a whole, it simply means sensitive data exposure, broken authentication, the possibility of cross-site scripting, and much more.

What’s next for app developers?

We need to build secure apps the right way. Being a paid developer and serious coder who also codes for fun on the weekend, I’d like to script and code everything. However what might be adventurous and interesting for me can pose risk to others if I don’t do it properly.

Best Practices?

Would it be better to maintain application development and security management separately? Should we isolate each portion? Perhaps not… Maybe the application should be self-aware in terms of security.

Is there a way to solve this easily?

What if there was some sort of security snippet that I could just use to snap security into my applications? I wouldn’t have to spend any more time dealing with this nuisance and could focus my energy on writing code. Don’t get me wrong – security is important. I absolutely believe that we should build secured mobile apps, but wouldn’t it be nice to have a no-fuss solution?

As V3’s Alastair Stevenson has observed, this means we need to explore; to find a new way to tackle these challenges; to cease relying on traditional approaches which have obviously failed.

What could be this new approach? I’ll go into details in the next post. In the meantime, feel free to share your thoughts with us.

Now back to my code…

Connect to me on Linkedin or follow me on Twitter @alesteska.

About the Author

Ales Teska

TeskaLabs’ founder and CEO, Ales Teska, is a driven innovator who proactively builds things and comes up with solutions to solve practical IT problems.


TurboCat.io

Data encryption tool for GDPR

More information


You Might Be Interested in Reading These Articles

Apple's Zero-Day Security Flaws on iOS, OS X Let Hackers Steal User Passwords

To show Apple a flaw in their environment, a team of University researchers created a malware app and uploaded it to the App Store. This malware can steal passwords from installed apps, email clients, and Google's Chrome web browser. By exploiting this flaw, hackers can bypass the App Store security check using this hacking app.

Continue reading ...

mobile security iOS

Published on July 28, 2015

The Top 5 Mobile Application Security Issues You Need to Address When Developing Mobile Applications

Most recently, a lot of established companies like Snapchat, Starbucks, Target, Home Depot, etc. have been through a PR disaster. Do you know why? Simply because some attackers out there found flaws in their mobile apps and could exploit them. In fact, by the end of this year, 75% of mobile apps will fail basic security tests.

Continue reading ...

mobile security

Published on November 03, 2015

5 Things You Need To Know About Securing Your Game App

The game industry is constantly evolving and growing on a rapid scale by each passing day. A significant part of this industry is mobile gaming. With huge advancements in mobile device technologies, gaming apps are on a high demand and so is their supply. One of the major reason behind this are the developers who are splurging millions of dollars in their time to market strategies. In all of this, the security of gaming apps takes a backseat, overlooked by developers in a haste a to launch their product before their respective competitors.

Continue reading ...

mobile security

Published on November 08, 2016