Connect with us

Hi, what are you looking for?

Tech & Science

Download alert: More Android apps found to have security vulnerabilities

A further cohort of Android apps have ailed the security test, as detected by independent investigations. What next for app development?

The Androids are among us. — Photo: © Digital Journal
The Androids are among us. — Photo: © Digital Journal

Researchers analyzing Android apps have discovered serious cloud misconfigurations leading to the potential exposure of data belonging to over 100 million users, as reported by Information Security Buzz.

In a report published on Thursday by Check Point Research (CPR), the cybersecurity firm said no less than 23 popular mobile apps contained a variety of “misconfigurations of third party cloud services.”

According to CPR, the 23 Android apps examined — including a taxi app, logo maker, screen recorder, fax service, and astrology software — leaked data including email records, chat messages, location information, user IDs, passwords, and images. In 13 cases, sensitive data was publicly available in unsecured cloud setups. These apps accounted for between 10,000 and 10 million downloads each.

As to how this has come about, ZDNet finds that too many apps seek to integrate with real-time databases to store and synchronize data across different platforms. All to often, the developers of some of the apps examined failed to make sure authentication mechanisms were in place.

Such issues carry risks to consumers, Pravin Rasiah, VP of Product, CloudSphere, tells Digital Journal.

Central to these risks is the application and use of cloud computing. In Rasiah’s opinion: “While cloud-based applications provide numerous benefits in management, accessibility and scalability, it only takes one oversight in authorization to put customer data at risk.”

What is needed is good governance, Rasiah explains, noting: “Without a comprehensive view of the entire cloud landscape, any gaps in security can exist for a prolonged period of time, waiting for a threat actor to find and exploit the data within.”

There are measures that can be taken. As Rasiah recommends: “To combat this risk, businesses should leverage a cloud governance platform providing the real-time observability required to stay apprised of any changes or updates in policy.”

In terms of what success will look like, Rasiah foresees: “These security guardrails ensure IT teams can remediate any flaws as soon as they occur. This way, businesses can minimize the attack surface in the cloud and ensure data remains protected.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

Catherine Berthet (L) and Naoise Ryan (R) join relatives of people killed in the Ethiopian Airlines Flight 302 Boeing 737 MAX crash at a...

Tech & Science

The groundbreaking initiative aims to provide job training and confidence to people with autism.

Tech & Science

Microsoft and Google drubbed quarterly earnings expectations.

Business

There is no statutory immunity. There never was any immunity. Move on.