In a study on mobile applications and their level of security, RIIS, LLC, a firm that specializes in mobile app development, said that some of the nation’s top brands, including airlines, retail outlets, entertainment companies, and insurance companies, are producing applications for Android that place users and their personal information at risk. The data comes from a study of twenty Android applications by RIIS, and how well they align to the OWASP Top 10. Of the twenty applications tested, only four were developed in such a way that when matched to the OWASP Top 10, they had no flaws at all. The other 16 however had at least one issue that could be problematic. [Which smartphone is the most secure?] Further, many of the applications tested are consumer focused, including Wal-Mart, Delta, Facebook, Geico, Ticketmaster, and Speedway. This means that the likelihood that they are on a given network is relatively high, especially the travel applications. The platform they’re developed for is an important risk consideration too, as research from Strategy Analytics, says that global smartphone shipments grew to a record 230 million units in the second quarter of 2013, and more than 80 percent of them were running Android. Delta’s ‘Fly Delta’ application, along with Geico’s application were the worst applications, with insecure data storage, poor authorization and authentication, broken cryptography, and sensitive information disclosure, issues discovered in each one. When asked for additional details, Godfrey Nolan, the lead researcher in the study, told CSO that Delta’s application stores the user’s password in an encrypted in a SQLite database. “However the key is in the APK which can be reverse engineered back into source code using some simple tools available on the internet,” he explained. As for the other problematic applications, Geico’s tool also exposed login information, as did the app from Ticketmaster. The application form LiveNation doesn’t use any encryption, and stored the login details in clear text. CSO asked Nolan if he felt that the rush to adopt cloud and BYOD is creating an environment where mobile development teams are pushed to produce products and code, while security is added after the fact. “I don’t think this is even on the radar for most companies,” he said. In fact, when questioned by RIIS, Nolan said that many of the developers the spoke to reacted negatively, as if to say that the issues that were discovered were not something they were concerned with, thus trading security for usability. His advice is for security staff to apply mobile security scanning techniques such as those outlined in the OWASP Top 10, in order to ensure the organization knows what apps are insecure before allowing them to be installed on any BYOD or company devices. However, on the other side of that coin, the applications developed by Wells Fargo, Chase, State Farm, and the Internal Revenue Service, were completely clean, and secured when judged against the OWASP list. All things considered, RIIS says that the safest applications don’t store any login information or sensitive user data on an Android device. “It is common practice (and a fundamental security flaw) to store the username and password encrypted in a SQLite database or shared preferences folder with a hardcoded encryption key which can be found by decompiling the APK,” the report adds. The full report is available here, but registration is required. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe