Appthority Report Looks at Risky Business from the Top 50 Apps

By Peter Bernstein February 27, 2013

At the RSA event in San Francisco the good news is that their halls and session rooms have been packed. And, as you can see there has been no shortage of news about exciting new capabilities on areas ranging from online services that give better threat visibility, to solutions for stronger identification and access management, and lots of activity surrounding what to do about detecting and defending against advanced persistent threats (ATPs) and distributed denial of service (DDoS) attacks, which continue to make headlines around the world. 

There has also be a concentration on the emerging issue created by the bring your own device (BYOD) phenomena about how secure apps are, especially surrounding those employees who are using on their personal devices when they are at work. Well Appthority, whose cloud-based Appthority Platform can automatically quantify the enterprise risk of apps by identifying malware and risky behaviors of public and private apps and determine which apps are safe for each job role based on risk profiles, is out with its newest App Report.   

Appthority’s security team used its cloud-based Appthority Platform to analyze the top 50 free apps from Apple’s App Store and Google Play for risky app behaviors.  The reason for looking at free apps is that they are the most likely to be sharing data with third-parties and/or leaking data than paid ones, along with the fact that they also are obviously extremely popular.

The report examines the differences between the Android and iOS app ecosystems, and compares app behaviors across five popular app categories (business, education, entertainment, finance, games). It also looks at the developers behind these apps.

As Appthority says, in why it produces the report, “The user should be armed with the knowledge of what apps actually do and have the choice to opt in to app permissions. Enterprises must also be aware of the risks posed by employee mobile devices when they’re used for work purposes. As employees bring new apps into the workplace, they’re putting company data and the networks these devices access at risk.”

Highlights from the App Reputation Report include:

  • 96 percent of total apps share data with advertising networks and/or analytics companies.
  • 79 percent of the top 50 free iOS and Android apps are associated with risky behaviors or privacy issues. Overall, iOS apps exhibited more risky behaviors than Android apps.
  • Entertainment apps were the worst offenders out of the top five categories, with the highest number of apps that track for location and share data with advertising networks and/or analytics companies.
  • More than half of the total apps track for location by accessing the device GPS or using other location tracking methods.
  • Another highlight is despite all the press about Android being less secure than iOS apps in terms of posing possible threats when brought into the enterprise, the opposite is true.

One section of the report is worth a pull out here. Appthority found that overall, entertainment apps exhibited the highest number of risky behaviors, particularly in terms of tracking the user’s location and sharing data with ad networks and analytics companies. Plus, none of the top business apps accessed the user’s calendar while many of the free ones do.  

The below chart may give you a reason to pause the next time you wish to download a free app in terms of the things it can do without your permission or knowledge.

Source: Appthority

There are a lot more great nuggets of information in the full report. But, there certainly is an area of chief security officer (CSO) concern, and while there are solutions that are quite good at revealing vulnerabilities, the report does highlight the old saying that “an educated consumer is the best customer.” It finally highlights that the fact that security needs to be looked at holistically in a BYOD world and that the things that need to be protected are people, processes, devices, apps and the networks they interact with. Apps are a critical part of the equation, and reports such as these in many ways should serve as a call to action.




Edited by Brooke Neuman
SHARE THIS ARTICLE
Related Articles

Future Watch Apps May Surprise You

By: Mike Russo    5/27/2015

If there's one thing that's abundantly clear about the Apple Watch, it's that this isn't your grandpa's timepiece. Oh, it tells time, sure. The rest i…

Read More

Why Apple iOS is Dominating Google's Android

By: Rob Enderle    5/27/2015

Apple's iOS platform is kicking Google Android's butt all over the Smartphone playground. This battle has been fascinating to watch because it seemed …

Read More

Internal Revenue Service is Latest to Be Successfully Hacked

By: Peter Bernstein    5/27/2015

Another day, another database of significance compromised. Indeed, if it was not the U.S. Internal Revenue Service (IRS) that was hacked, setting medi…

Read More

Goodbye Personal Computers

By: Doug Mohney    5/26/2015

The phone is likely to be the central form factor, but people are going to carry other devices as well. Samsung has received a patent on a device that…

Read More

Charter Springs Big for TWC with $78.7Bn Offer

By: Tara Seals    5/26/2015

The valuation makes Comcast's previous, failed $45 billion offer for TWC look like chump change. And it blows away the $132.50 per share, or $37.3 bil…

Read More