Developers are failing to respond quickly to reports of security flaws, Trojans are infecting corporate devices at an alarming rate, and even mundane data about your device's power consumption could threaten your privacy.

Thomas Claburn, Editor at Large, Enterprise Mobility

February 24, 2015

4 Min Read
<p align="left">(Image: <a href="https://www.flickr.com/photos/karanj/31869410/in/photolist-3PkEA-2K8Z6P-hWgtKv-nxvdrC-ipM7jT-98US7o-9hPXGx-9WdK5j-5aPBBA-dRfa29-fFPH67-5Q5fr6-73kcsh-6u5nkJ-dRfa5C-hWgtAc-ML9fq-ndvEHi-ndvYD6-sKJS4-69xn4K-oUcE5b-6H4sY3-5Dqc3f-cihyDs-eh7vF6-8tD9-6PUoqG-8V8tAB-dokph3-dG94L6-4bez7x-Lb7EN-bsSQgE-9Ww2mx-7K9dxx-hWfJMu-4jSAas-5roJ3E-5Q5g4D-6M6H8o-qarsDh-4zc43N-bem42D-Lbnv2-pZrE6e-9n6vt7-8tYps9-6icFYj-86AyNQ"target="_blank">karanj</a> -- CC BY-SA 2.0)</p>

8 iOS, Android Apps That Are Strangely Useful

8 iOS, Android Apps That Are Strangely Useful


8 iOS, Android Apps That Are Strangely Useful (Click image for larger view and slideshow.)

As if we needed more to worry about when it comes to cyber-security, three recent reports highlight the frailty of mobile devices and mobile apps. Each of the reports -- from McAfee Labs, Lacoon Mobile Security in partnership with Check Point, and Stanford University, working with Rafael Advanced Defense Systems Ltd -- focuses on key deficiencies in mobile security.

According to the McAfee Labs Threat Report for February 2015, mobile developers have failed to patch critical secure sockets layer (SSL) vulnerabilities months after the vulnerabilities were disclosed.

Last month, McAfee Labs tested 25 of the most popular Android apps on CERT's list of vulnerable mobile apps and found that 18 of them remain unpatched despite public disclosure and vendor notification. Out of more than 1 million Android apps tested by CERT using automated scans, at least 23,000 have failed dynamic SSL validation testing.

[ Suffering from insomnia? Don't read Why Kasperky's Bank Robbery Report Should Scare Us All. ]

McAfee simulated a man-in-the-middle (MitM) attack and managed to successfully intercept information such as login credentials during supposedly secure sessions. The Superfish adware that Lenovo installed on some of its laptops from September through December 2014 has been criticized because it enables attacks of this sort.

"Mobile app developers must take greater responsibility for ensuring that their applications follow the secure programing practices and vulnerability responses developed over the past decade," said Vincent Weafer, SVP of McAfee Labs, in a statement.

Developers also need to be aware that vulnerabilities may be introduced through third-party analytics libraries. Among 10 analytics libraries found to be vulnerable by CERT, only 4 have been fixed.

McAfee Labs is not alone in its view that mobile devices are insufficiently secure. Last week, Lacoon Mobile Security and Check Point Software Technologies issued a report noting that one out of every 1,000 mobile devices on enterprise networks has been compromised by a mobile remote access Trojan (mRAT). The report suggested that for organizations with at least 2,000 devices, there's about a 50% chance that the internal corporate network itself has been infected with some form of malware.

Lacoon and Check Point said fewer organizations than expected appear to be infected by mRATs, but added that higher than average rates of mRAT infection in certain regions, such as the US, indicate that specific individuals and companies are being targeted. Coming in the wake of the massive Anthem breach, that should prompt some concern.

To further underscore the frailty of mobile security, researchers at Stanford University and Rafael Advanced Defense Systems Ltd. have found that developers can bypass restrictions on location data by tracking mobile power usage over a period of a few minutes.

The researchers in a paper note that there are 179 Android apps in the Google Play store with the permissions necessary to access to voltage and current data. Most, if not all, of these apps presumably use the data for legitimate purposes, such as assessing battery life. But were the developers of these apps determined to track where people go, they could employ the techniques described in the paper to infer the user's location history using power consumption data.

Such research raises the possibility that other seemingly innocuous data could be used to compromise privacy and security. It also amplifies related findings about how privacy often can be pierced by correlating a few salient bits of data.

Mobile security, in short, is a moving target, one that's increasingly hard to keep up with.

Attend Interop Las Vegas, the leading independent technology conference and expo series designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities, and classes that will help you set your organization’s IT action plan. It happens April 27 to May 1. Register with Discount Code MPOIWK for $200 off Total Access & Conference Passes.

About the Author(s)

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights