Mobile Services can also be Hacked

Mobile Services can also be Hacked

Almost every mobile application is vulnerable to remote hacker attacks, and more than a third of them are at high risk of being hacked. This is the conclusion reached by experts in the study of threats to mobile applications. 


The methods of theft are quite diverse - for example, virus software can track user manipulation of the keyboard or take screenshots while launching a banking application. 


It is almost impossible to completely protect a smartphone from infection. In order to increase security, it is necessary to update applications in a timely manner and carefully monitor the requested access rights to this or that information.


43% of Apps for Android and 38% of apps for iOS had high-risk vulnerabilities. This means that attacking such services will not cause significant difficulties for hackers, as a result of which they will be able to freely use the application for their own purposes. 


At the same time, in 89% of cases, physical access to the device is not required - they can penetrate into the smartphone remotely.


A common problem for almost all mobile services is the unsafe storage of data, as a result of which passwords, financial information, personal data and private correspondence of users are at risk, as per the head of the mobile applications security research group and one of the authors of the study.


At the same time, most of the shortcomings are of a systemic nature. They appear in applications even at the stage of their design.


The leakage of such data is fraught with the loss of money: for example, an attacker can gain access to the banking application itself or confidential financial information and use it for illegitimate payments. Moreover, the user may not even know about transactions with his account.


The virus is capable of hiding messages about transfers from him. According to experts, 54% of all attacks were carried out with the aim of stealing information like personal correspondence, trade secrets, credentials and personal data. 

 

About the Author

Rajaraman K

Rajaraman K

I am an aspiring writer and blogger.


Please Log In to post comments

Login


Forgot Password?

Sign Up