Having a Field Day with Your Android Apps? So Do Cyber Criminals!

ostrich

You love your Android phone and you love to go to the Play Store and download exciting new apps. You have also been through the Crazy Birds obsession and the Candi Crush mania. But do you know that your Android phone is not secured against the smartest of breaches: mobile app hackers. Before we go ahead and explain the intensity of this threat to mobile apps, especially Android apps, let’s have a look at the facts and figures, reported by Arxan, regarding mobile app hacks:

  • 97% of top 100 paid Android apps have been hacked.
  • 87% of top 100 paid iOS apps have been hacked.
  • 80% of popular free Android apps have been hacked.
  • 75% of the popular free iOS apps have been hacked.

and more 97% of top 100 paid Android apps have been hacked. 87% of top 100 paid iOS apps have been hacked. 80% of popular free Android apps have been hacked. 75% of the popular free iOS apps have been hacked.

These facts and figures are horrifying. What we once considered a safe way of computing, exchanging information and thoughts and communicating with others, has turned out to be totally vulnerable to security threats like mobile app breaches. Our intention is not to frighten you, but reality is harsh. The oh so glorious Google’s Android OS is not safe. What if we tell you that an app that you have on your Android phone, is likely to be a fake, produced by some smart cybercriminals? After Google decided to transform the Android Market into Google Play, such criminals have great fun producing fake apps. Even Google Play is compromised, what do you expect from Android apps on your phone?

What to do? One option might be to live in a layman’s Utopia and believe that malwares and hacking are only for computers, and that your smart phone is immune. Another option, and a smart one, is to consider a security plan against mobile app hacking. When we talk about the security of apps on your mobile phone, specifically for an Android phone, the security can be provided at three different levels. One layer of protection is on device level; it varies from device to device and approach focuses on the device and not the operating system, let alone the vulnerable apps. Another layer of security is on the operating system level. This may vary from iOS to Android, but again the vulnerability of apps is not fully addressed in this type of security doctrine. A whole new level of security is at the application level. There are different types of apps in a mobile phone. We are not discussing the difference due to their functions e.g. fun, games, entertainment or communication but by the difference design of the apps. The more important apps are the custom apps presented in every Android phone. Just imagine if someone successfully infiltrates into your Gmail app? Your personal correspondence and financial communication would be at the mercy of a vicious stranger.

You need maximum security, and that can only be ensured with the help of a reliable tool to provide security on the application level. This type of security ensures that you get strong protection against app hacking attempts and keep your financial and personal details safe.

Enjoy using certain custom and downloaded apps on your Android phone all you want, but bear in mind the importance of maximum app security.

Want to make sure that your Android is secured? Get in touch info@teskalabs.com or tweet us @TeskaLabs.

Photo: Shareasimage


TurboCat.io

Data encryption tool for GDPR

More information


You Might Be Interested in Reading These Articles

How to Teach Your Kids to Safely Play Pokemon GO

This summer something strange has occurred in my household. Suddenly, all of my children ranging in age from 9 to 18 are willingly piling into our van the minute I mention driving anywhere- even to the grocery store. And it’s not my company or the possibility of picking out this week’s cereal they are seeking. No, they are merely wanting a ride to aid them on their hunt for elusive Pokémon.

Continue reading ...

security mobile musing

Published on August 30, 2016

Why Is Data Encryption Necessary even in Private Networks?

Securing data transferred between different endpoints is important not only through public networks but also in private networks. The data has to be protected if it is business critical or if modification or interception leads to a security incident with a high business impact.

Continue reading ...

security

Published on May 03, 2016

You Can Build Apps for the Apple TV, But Do You Know How to Do It Securely?

Apple will want to dominate the market for TV apps. To achieve this objective, it’s understandable that Apple makes it easy for app developers to create apps and games for the Apple TV platform using tvOS and profit from them just as they have already done so for the iPhone and iPad devices. Developers can leverage similar frameworks and technologies since tvOS is just a modified version of the iOS. They can even retrofit the apps that were previously developed for iOS to support the Apple TV’s tvOS.

Continue reading ...

mobile security

Published on June 29, 2016