Blog Layout

Mobile App Vulnerabilities Found To Leave Data Unsecured

sccomputerguys • Mar 24, 2021

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That's good in theory, but based on new research from Zimperium, a disappointing percentage of app developers don't do nearly enough to secure the data they're housing for you. In fact, the recent study indicated that fully 14 percent of iOS and Android apps that use cloud storage had insecure configurations or were otherwise vulnerable to attacks by third parties.

Naturally, depending on the exact nature of the apps you use, the nature of the data that's stored within them will vary markedly. Thus, hackers who breach those unsecured cloud storage systems may wind up with little more than your email address and your latest high score on whatever game you're obsessed with at the moment, or they could wind up with sensitive financial and/or health-related data.

It should be noted though, that even relatively innocent apps like games (that don't keep much in the way of personal information) often ask for and receive a wide range of intrusive permissions on your device. That means the developers of those apps could be harvesting a lot of more sensitive data you weren't even aware of.

The study puts the exclamation point on the end of two very important points that are well worth remembering. One, it pays to read every app's terms of service agreement closely and monitor exactly what permissions every app you install is asking for, and selectively denying that permission if you deem it to be a bit too intrusive for your comfort.

Second, it's well worth taking a bit of extra time to uninstall any app that you lose interest in and stop using. By keeping it on your device just in case you decide to circle back to it later, you're increasing your exposure and increasing your risk.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: