3/4 of Mobile Apps are VulnerableAdded: Tuesday, September 16th, 2014
Category: Bit Torrent Freedom > The Industries Of Records, Gaming, Software, Movies
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2014
According to Gartner report, 3/4 of the tested mobile apps fail the most basic security tests, which poses threats for both individuals and corporations, because enterprise employees use applications downloaded somewhere from the Internet while also using them to access business networks. Such applications can violate enterprise policies and expose enterprises to threats.
Gartner experts claimed that enterprises embracing mobile computing and “bring your own device” (also known as BYOD) strategies are mostly vulnerable to security breaches. The only way to protect is believed to be adoption of methods and technologies for mobile app security testing and risk assurance.
Indeed, nowadays far too many enterprises are inexperienced in mobile app security. Moreover, in most cases when application security testing is undertaken, it is done casually by developers who care about not the security of the apps, but about their functionality.
Gartner pointed out that the developers who supply static and dynamic application testing are able to prevent problems on the enterprise. In addition, the security experts explained that a new test called behavioral analysis is now becoming popular for mobile applications. At the moment, over 90% of enterprises today use 3rd-party commercial apps for their mobile BYOD strategies. Apparently, this is where current major app security testing efforts should be applied.
It is not a secret that there are a lot of applications in app stores that prove their advertised usefulness. However, both companies and individuals should use them only considering their security. Security specialists recommend downloading and using only those apps that have successfully passed security tests. In most cases, the biggest problem is misconfiguring devices, for instance by misusing personal cloud service via apps on smartphones or tablets.
September 16th,2014Posted by:
Tuesday, September 16th, 2014No comments
Most Popular Stories