In a study on mobile applications and their level of security, RIIS, LLC, a firm that specializes in mobile app development, said that some of the nation's top brands, including airlines, retail outlets, entertainment companies, and insurance companies, are producing applications for Android that place users and their personal information at risk.\n\nThe data comes from a study of twenty Android applications by RIIS, and how well they align to the OWASP Top 10. Of the twenty applications tested, only four were developed in such a way that when matched to the OWASP Top 10, they had no flaws at all. The other 16 however had at least one issue that could be problematic.\n\n[Which smartphone is the most secure?]\n\nFurther, many of the applications tested are consumer focused, including Wal-Mart, Delta, Facebook, Geico, Ticketmaster, and Speedway. This means that the likelihood that they are on a given network is relatively high, especially the travel applications. The platform they're developed for is an important risk consideration too, as research from Strategy Analytics, says that global smartphone shipments grew to a record 230 million units in the second quarter of 2013, and more than 80 percent of them were running Android.\n\nDelta's 'Fly Delta' application, along with Geico's application were the worst applications, with insecure data storage, poor authorization and authentication, broken cryptography, and sensitive information disclosure, issues discovered in each one.\n\nWhen asked for additional details, Godfrey Nolan, the lead researcher in the study, told CSO that Delta's application stores the user's password in an encrypted in a SQLite database.\n\n"However the key is in the APK which can be reverse engineered back into source code using some simple tools available on the internet," he explained.\n\nAs for the other problematic applications, Geico's tool also exposed login information, as did the app from Ticketmaster. The application form LiveNation doesn't use any encryption, and stored the login details in clear text.\n\nCSO asked Nolan if he felt that the rush to adopt cloud and BYOD is creating an environment where mobile development teams are pushed to produce products and code, while security is added after the fact. \n\n"I don't think this is even on the radar for most companies," he said.\n\nIn fact, when questioned by RIIS, Nolan said that many of the developers the spoke to reacted negatively, as if to say that the issues that were discovered were not something they were concerned with, thus trading security for usability.\n\nHis advice is for security staff to apply mobile security scanning techniques such as those outlined in the OWASP Top 10, in order to ensure the organization knows what apps are insecure before allowing them to be installed on any BYOD or company devices. \n\nHowever, on the other side of that coin, the applications developed by Wells Fargo, Chase, State Farm, and the Internal Revenue Service, were completely clean, and secured when judged against the OWASP list.\n\nAll things considered, RIIS says that the safest applications don't store any login information or sensitive user data on an Android device.\n\n"It is common practice (and a fundamental security flaw) to store the username and password encrypted in a SQLite database or shared preferences folder with a hardcoded encryption key which can be found by decompiling the APK," the report adds.\n\nThe full report is available here, but registration is required.