{"id":81519,"date":"2022-07-06T10:41:08","date_gmt":"2022-07-06T02:41:08","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=81519"},"modified":"2022-07-06T10:41:12","modified_gmt":"2022-07-06T02:41:12","slug":"why-app-security-should-be-priority__trashed","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/why-app-security-should-be-priority__trashed\/","title":{"rendered":"Why Should Mobile App Security be a Top Priority for Developers?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"800\" height=\"450\" alt=\"why-should-app-security-be-top-priority\" title=\"why-should-app-security-be-top-priority\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2021\/12\/why-should-app-security-be-top-priority.jpg\" class=\"img-responsive wp-image-80604\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2021\/12\/why-should-app-security-be-top-priority-200x113.jpg 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2021\/12\/why-should-app-security-be-top-priority-400x225.jpg 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2021\/12\/why-should-app-security-be-top-priority-600x338.jpg 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2021\/12\/why-should-app-security-be-top-priority.jpg 800w\" sizes=\"(max-width: 800px) 100vw, 800px\" loading=\"lazy\" \/><\/span><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:15px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"font-weight: 400;\">In 2021, the number of smartphone users in the world is 6.378 billion, translating to 80.69% of the world&#8217;s population. The large user size has made mobile phones the new prey of choice for hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet, mobile app developers are not spending more on securing mobile apps. According to a <a href=\"https:\/\/hbr.org\/2017\/11\/hackers-are-targeting-your-mobile-phone-here-are-15-ways-to-slow-them-down#:~:text=According%20to%20a%202016%20report,reach%20%241.5%20billion%20by%202021.&amp;text=The%20same%20report%20says%20%2434,is%20spent%20on%20app%20security.\">2016 report on mobile security by Intertrust<\/a>, $34 million was spent annually on mobile app development while only $2 million was spent on app security. To further support the point, <a href=\"https:\/\/medium.com\/nerd-for-tech\/securing-mobile-app-build-a-secure-and-private-mobile-user-experience-e283a8d11d26\">Verizon&#8217;s 2020 Mobile Security Index<\/a> shows 43% of organizations sacrificed mobile security in the past year, with many mobile app development teams being asked to prioritize time to market over security.\u00a0<\/span><\/p>\n<p><b>What is Mobile App Security?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mobile app security is the measure to secure mobile applications from external threats like malware, hacking or other criminal manipulations that may put possible risk to personal and financial information available in the mobile (e.g. banking information, current location).<\/span><\/p>\n<p><b>What is Happening Now and Why Should Users be Concerned?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mobile apps now play an integral role with many businesses and users relying on them for various activities such as work, education, entertainment and more. Mobile app security has become more important than ever before. Recently, security researchers at Threat Fabric discovered <a href=\"https:\/\/www.wired.com\/story\/malicious-google-play-apps-stole-banking-info\/\">a batch of apps downloaded from the Google Play Store<\/a> more than 300,000 times to be banking trojans, stealing user passwords and two-factor authentication codes. The misconception that every app on Google Play Store and Apple Store is safe and legitimate may no longer be true. App developers need to understand their role in app security and how a user or business data can be put at risk when the apps developed do not meet the security standards.\u00a0<\/span><\/p>\n<p><b>What are App Developers Risking when Their Developed Apps are Not Secured?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mobile apps carry their own set of vulnerabilities. As developers, you hold the responsibility to step up and think ahead of unintended consequences when it comes to app security, and this includes identifying the common mobile app security threats and how to counter them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><u>Code Injection<\/u><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Code injection &#8211; the execution of malicious code on mobile devices via a mobile app. Consider a login form that does not have any input restrictions, giving hackers the opportunity to enter any character or even JavaScript code snippet to compromise user data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><u>Data Leakage<\/u><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile apps typically need to access or transmit data across the network, which exposes user data. An example is the once wildly popular <\/span><a href=\"https:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data\"><span style=\"font-weight: 400;\">Angry Birds game<\/span><\/a><span style=\"font-weight: 400;\">, labeled as a &#8220;leaky&#8221; app that NSA had tapped on to gather large amount of personal data &#8211; including age, gender, location and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><u>Security Decisions via Untrusted Inputs<\/u><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Developers may assume that inputs such as cookies, environment variables and hidden form fields cannot be modified. However, these inputs can be modified by an untrusted actor. When security decisions such as authentication and authorization are made based on these inputs, attackers can bypass the app\u2019s security to bring harm to the business and users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><u>Insufficient Transport Layer Protection<\/u><\/span><\/p>\n<p><span style=\"font-weight: 400;\">When designing a mobile app, data is commonly exchanged in a client-server fashion, flowing between carrier networks and the internet. Applications without enough measures to protect data exchange in the network traffic, failing to authenticate and encrypt sensitive network traffic, open up opportunities for hackers to view this sensitive data while in transmission.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Listed above are just some threats app developers are currently facing. As new technologies continue to develop, developers are likely to face new challenges and app protection needs to be continuously updated to keep up with the latest security threats. In the next article, we will discuss what we can put in place to counter the challenges and secure our enterprise apps.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">References:\u00a0<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world\"><i><span style=\"font-weight: 400;\">https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world<\/span><\/i><\/a><\/p>\n<p><a href=\"https:\/\/searchapparchitecture.techtarget.com\/tip\/4-mobile-app-security-threats-all-developers-must-face\"><i><span style=\"font-weight: 400;\">https:\/\/searchapparchitecture.techtarget.com\/tip\/4-mobile-app-security-threats-all-developers-must-face<\/span><\/i><\/a><\/p>\n<p><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2014-risks\/m3-insufficient-transport-layer-protection\"><i><span style=\"font-weight: 400;\">https:\/\/owasp.org\/www-project-mobile-top-10\/2014-risks\/m3-insufficient-transport-layer-protection<\/span><\/i><\/a><\/p>\n<p><a href=\"https:\/\/www.informationweek.com\/mobile-applications\/mobile-app-development-5-worst-security-dangers\"><i><span style=\"font-weight: 400;\">https:\/\/www.informationweek.com\/mobile-applications\/mobile-app-development-5-worst-security-dangers<\/span><\/i><\/a><\/p>\n<p><a href=\"https:\/\/economictimes.indiatimes.com\/tech\/internet\/internet-security-101-six-ways-hackers-can-attack-you-and-how-to-stay-safe\/articleshow\/61342742.cms?from=mdr\"><i><span style=\"font-weight: 400;\">https:\/\/economictimes.indiatimes.com\/tech\/internet\/internet-security-101-six-ways-hackers-can-attack-you-and-how-to-stay-safe\/articleshow\/61342742.cms?from=mdr<\/span><\/i><\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mobile apps carry their own set of vulnerabilities. As developers, you hold the responsibility to step up and think ahead of unintended consequences when it comes to app security, and this includes identifying the common mobile app security threats and how to counter them. <\/p>\n","protected":false},"author":2,"featured_media":80604,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[174],"tags":[],"class_list":["post-81519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=81519"}],"version-history":[{"count":3,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81519\/revisions"}],"predecessor-version":[{"id":81753,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81519\/revisions\/81753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/80604"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=81519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=81519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=81519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}