Top Paid and Free Mobile Apps: Think They're Secure? Really?

July 30, 2013
By: Tony Rizzo

Application risk management vendor Appthority has been a constant trusted source for us in detailing where many mobile app security issues are to be found. The company has a knack for digging in behind the obvious and for pulling out what are more often than not the “not so obvious” issues that many of us – including those among us who are supposed to know better – often fall prey to. Well, the company has now delivered on its “Summer 2013 App Reputation Report,” which brings us up to date on where things stand, and it isn’t all that pretty a picture the report paints.

Why do we trust Appthority? The answer to that question is to be found in the methodology the company employs – a cloud-based and automated App Risk Management service that employs static, dynamic and behavioral analysis to discover the true behavior of apps and to measure total risk within minutes. Over time, the company has built the world's largest database of analyzed public and private apps from a global network of sources. Appthority has analyzed over one and a half million apps for its Global 2000 and government customers. We trust the data.


Image via Shutterstock

The new report examines how the BYOD movement has led to the mixing of personal and corporate data on employee-owned devices (yes, that is obvious) and how the apps we use every day can put that data at risk (ah, the not so obvious). The report also shares some very interesting information on how some app developers collect data on users as a money-making technique.

Domingo Guerra, co-founder and president at Appthority, notes, "In analyzing both paid and free apps in our report, we've identified several new security trends within the global app ecosystem. For example, we measured how paid apps – like free apps – are now supporting in-app purchasing and sharing data with ad networks as a method of generating revenue. The problem is they do this even if it means putting user and corporate data at risk. We also discovered several popular iOS apps that access the unique device identifier associated with every device, even though Apple (News - Alert) strictly prohibits this activity.  These identifiers can easily be linked back not only to private user information but to activity as well as users navigate across apps."

Below we’ve pulled the key findings from the App Reputation Report.

That’s more than enough to keep security and privacy hawks on their toes, especially within the enterprise. We continue to find that enterprises are far too lax in policing these issues, and in many cases they simply don’t know what they should be policing. Appthority’s findings at least help us to better understand where the vulnerabilities are.

The full report and a very interesting infographic with additional details are available directly from Appthority.




Edited by Alisen Downey


Original Page