Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Unsafe mobile apps end up on corporate devices

by The Gurus
March 11, 2015
in Editor's News
Share on FacebookShare on Twitter

A survey of “unsafe” applications has found that 85 per cent expose sensitive device data, and a third perform suspicious security actions.
The survey of 400,000 mobile applications by Veracode, found that 140,000 were deemed to be unsafe, and a third (37 per cent) checking to see if the device is rooted or jailbroken and another third (35 per cent) retrieve or share personal information about the user such as browser history and calendars.
Speaking to IT Security Guru, Veracode vice president of mobile security Theodora Titonis, said the behavioural analysis was on static applications which allowed it to see the application behaviour. “We found that three per cent of what we looked at were malicious apps and there was a high probability of it doing something like trying to root a device,” she said. “Also we saw that some were trying to get to the device identifying information and unique identifier to track the user. With an iOS flashlight app we found it
Titonis said that one problem is that apps are built using old code libraries and third party data, and there is no insight into what the libraries are doing, so businesses are reliant on verification services such as that offered by Veracode to do static analysis.
“Many mobile apps are unsafe because they unknowingly access insecure third-party libraries and frameworks in the software supply chain – while other apps have been specifically designed to perform malicious actions,” said Chris Wysopal, Veracode co-founder, CISO and CTO.
“Veracode’s automated cloud-based reputation service and MDM/EMM integrations were purpose-built to address the speed and scale required to effectively secure employee devices in global enterprise environments.”
Titonis said that the bigger problem with the mobile apps is that many people will download them to their corporate devices, there are options such as mobile device management and dual persona functions to keep apps apart, but often employees want convenience.
She said: “I look at tools as a programme to bring together security, IT and the business unit, but IT cannot keep up with blacklisting apps so they need to scale a programatic approach. When devices are issued, businesses need to decide what apps are allowed on the device, otherwise how do you know what apps are being accessed and what they are doing?
“The first phase is about working with the employee and if you find something you don’t want on the device, send notifications, then block enterprise email and finally remote wipe. It is better than blocking as an employee will find ways around.”

FacebookTweetLinkedIn
Tags: ApplicationMDMphone
ShareTweetShare
Previous Post

CAPTCHA-beating Trojan Podec hits Russians

Next Post

PCI compliance drops before and after initial audit

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information