Recent investigations about weaknesses and threats in mobile applications have found that iPhone and iPad users are not as secure as they think, leaving their personal data at stake. Reports posted this week have stated that the amount of iOS app downloads is not secure.
An annual analysis of mobile application security from Positive Technology finds that approximately 38% of the Apple iOS app includes critical criticisms.
This is compared to a higher number of Android apps, 43%, reported by the report can be categorized as at least different and that means similar level of security applications on the platform.
Most of the weaknesses, the researchers point out, due to the lack of safety mechanisms that existed during the design of the level design; at 54% of Android apps but 74% for iOS people. About a third of all the weaknesses, on the side of the customer’s two platform applications, are classified as high-risk.
Because I’m writing a number of iOS
Androids that are not related to me as an Android fan; I am happy to have and use Android and iOS devices all year round. But he has all but thought it is popular but because the iPhone and iPad devices have no safety issues.
This needs to be addressed, in a rugged and not emotional way, so that IOS user platforms can be better protected than people who will reduce them. Android users should also have fun with security issues, but as a platform that is found to be less secure than Apple, people are more concerned for a long time. I’ll call people here in Forbes, just like I’m working.
There are many security
mechanisms that play on your device, the installed applications can only access those files in their own sandbox directory between people along with user rights that do not allow editing file systems. can create a gap in this protection and an opportunity for striker striker.
Unrecognized storage of data is known as the most common caused by the study’s Positive Technology, which has 76% percent of the application, and can cause attackers accessing passwords, information, personal data and letters. Of these disadvantages, 89% can be explored by malware.
The risk is clearly higher on devices that have been “rooted” or “removed” by the owner to give more control over what they can and can not install. However, the report states that malware can also get the user to access the data and then send it to an attacker without knowing the user.
‘Challenging Not Having’ Cyber Security Today
For example, when iOS sets an even stronger match on the Android usage keyboard, the reports find failed by the developer to solve the custom keyboard extension. “If the user allows an interaction network,” the report states regarding the third-party keyboard, “Apple can not control what the developer keyboard has made with keystrokes of data.”
Leigh-Anne Galloway, the founder of security security that directs Positive Technology, points out, “The developer seeks to make the software fun to give us a good and easy experience and people like to install mobile applications and provide personal information.
” He also pointed out that the importance of these applications is not critical, with the unwanted attention to addressing this problem. Indeed, the server side of the application server, where the developer stores and processes information, is also less protected.
The report found that 43% of the component’s tenant had “poor or very poor protection” and 33% had critical critique such as unauthorized and leakage information.
Francesco Cipollone, a cybersecurity expert from NSC42 consultancy and head of security architecture at HSBC Global Banking and Markets, told us that many applications appeared in the App Store, “developed by a small company or even a group company.” This is a penny