Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Around 75% of mobile applications do not possess secured data storage


Positive Technologies has just published its yearly security report on mobile applications indicating that cyber-criminals most often don't require to physically get hold of the smart-phone of their victim for theft of data.


A research on applications pertaining to iOS and Android following their extensive testing shows that if data isn't stored in a secure manner it's described as a security flaw within smart-phone applications of the commonest order. The report titled "Vulnerabilities and Threats in Mobile Applications for 2019" reveals that whereas critical security flaws occur a little more commonly within applications on Android they're not so on iOS apps. www.techradar.com posted this June 20, 2019.


A total 76 percent of mobile applications were identified as having poorly or little secured data storage while within certain cases the security flaw could facilitate threat actors to filch personal data, financial information, passwords and e-mails/messages.


The research further found that 89% of the security flaws uncovered were exploitable with malware. But with rooted devices or even jail broken ones, there's a much higher risk of attack, although malware is capable of also escalating privileges. That's because when it infects a victim's device it usually seeks consent for accessing his data while incase consent is given, that same malware would upload the data onto hackers' server. www.computerweekly.com posted this June 20, 2019.


It's further evident that applications' server side is similarly insecure as their client side. Here the cited applications are those that the developer hosts while he's tasked with storing, processing as well as synchronizing data.


Leigh-Anne Galloway of Positive Technologies as chief of online security resilience says smart-phone owners by maintaining some practices can keep themselves safeguarded against inadequate security of data storage as well as increasing threat from malware.


It's recommended that end-users minutely read reviews coming with applications that ask for enabling access of data or phone functions. Incase they feel suspicious about an app asking for access for carrying out its job properly, they must turn down the request. Moreover, end-users require being watchful while ignore unfamiliar web-links inside chat apps and SMS, while also ignore taking down applications from 3rd-party application stores.


» SPAMfighter News - 6/24/2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page