Appthority Report Looks at Risky Business from the Top 50 Apps

By Peter Bernstein February 27, 2013

At the RSA event in San Francisco the good news is that their halls and session rooms have been packed. And, as you can see there has been no shortage of news about exciting new capabilities on areas ranging from online services that give better threat visibility, to solutions for stronger identification and access management, and lots of activity surrounding what to do about detecting and defending against advanced persistent threats (ATPs) and distributed denial of service (DDoS) attacks, which continue to make headlines around the world. 

There has also be a concentration on the emerging issue created by the bring your own device (BYOD) phenomena about how secure apps are, especially surrounding those employees who are using on their personal devices when they are at work. Well Appthority, whose cloud-based Appthority Platform can automatically quantify the enterprise risk of apps by identifying malware and risky behaviors of public and private apps and determine which apps are safe for each job role based on risk profiles, is out with its newest App Report.   

Appthority’s security team used its cloud-based Appthority Platform to analyze the top 50 free apps from Apple’s App Store and Google Play for risky app behaviors.  The reason for looking at free apps is that they are the most likely to be sharing data with third-parties and/or leaking data than paid ones, along with the fact that they also are obviously extremely popular.

The report examines the differences between the Android and iOS app ecosystems, and compares app behaviors across five popular app categories (business, education, entertainment, finance, games). It also looks at the developers behind these apps.

As Appthority says, in why it produces the report, “The user should be armed with the knowledge of what apps actually do and have the choice to opt in to app permissions. Enterprises must also be aware of the risks posed by employee mobile devices when they’re used for work purposes. As employees bring new apps into the workplace, they’re putting company data and the networks these devices access at risk.”

Highlights from the App Reputation Report include:

  • 96 percent of total apps share data with advertising networks and/or analytics companies.
  • 79 percent of the top 50 free iOS and Android apps are associated with risky behaviors or privacy issues. Overall, iOS apps exhibited more risky behaviors than Android apps.
  • Entertainment apps were the worst offenders out of the top five categories, with the highest number of apps that track for location and share data with advertising networks and/or analytics companies.
  • More than half of the total apps track for location by accessing the device GPS or using other location tracking methods.
  • Another highlight is despite all the press about Android being less secure than iOS apps in terms of posing possible threats when brought into the enterprise, the opposite is true.

One section of the report is worth a pull out here. Appthority found that overall, entertainment apps exhibited the highest number of risky behaviors, particularly in terms of tracking the user’s location and sharing data with ad networks and analytics companies. Plus, none of the top business apps accessed the user’s calendar while many of the free ones do.  

The below chart may give you a reason to pause the next time you wish to download a free app in terms of the things it can do without your permission or knowledge.

Source: Appthority

There are a lot more great nuggets of information in the full report. But, there certainly is an area of chief security officer (CSO) concern, and while there are solutions that are quite good at revealing vulnerabilities, the report does highlight the old saying that “an educated consumer is the best customer.” It finally highlights that the fact that security needs to be looked at holistically in a BYOD world and that the things that need to be protected are people, processes, devices, apps and the networks they interact with. Apps are a critical part of the equation, and reports such as these in many ways should serve as a call to action.




Edited by Brooke Neuman
SHARE THIS ARTICLE
Related Articles

Strategy Analytics: Shakeups Abound in the Tablet Market

By: Steve Anderson    7/31/2015

While the tablet market is something of a lesser phenomenon compared to the smartphone market, there's still quite a bit happening. A new report from …

Read More

Chattanooga: Much More than GigCity

By: Doug Mohney    7/31/2015

It is far too simple to say Chattanooga's high-speed fiber optic network is the cornerstone to the city's future growth. While city leaders and operat…

Read More

Taking a Look into Windows 10

By: Joe Rizzo    7/31/2015

On July 29, 2015 the long awaited release of Windows 10 arrived. You may have noticed that Microsoft went from version 8.1 to Windows 10, which is due…

Read More

Windows 10: One Giant Step into the Future

By: Rob Enderle    7/30/2015

This is Windows 10 launch week and things are going pretty well. Unlike some rumors to the contrary, the OEMs are ready with preloads and so far, the …

Read More

Cyberattacks on OPM, Anthem and United Airlines are Linked

By: Peter Bernstein    7/30/2015

The bad news on the cyberattack front got a whole lot worse with a story from Bloomberg by reporters Michael Riley and Jordan Robertson that revealed …

Read More