ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Three quarters of mobile apps have this security vulnerability which could put your personal data at risk | #CyberSecurity #CyberHygiene #Awareness #MobileSecurity #Vulnerabilities 

Three quarters of mobile applications have vulnerabilities relating to insecure data storage, leaving both Android and Apple iOS users open to cyber attacks which could allow hackers to steal sensitive information.

Insecure data storage is just one of a number of vulnerabilities which a security company's researchers said they have found after conducting security assessments of a number of mobile applications for both iPhones and and Google Android devices.

The findings have been outlined in the Vulnerabilities and Threats in Mobile Applications 2019 report from Positive Technologies.

Insecure data storage is by far the most common vulnerability identified in the tested applications, with 76 percent of those examined found to demonstrate this as a security risk, potentially putting the privacy and security of users at risk.

Just over a third of applications (35 percent) have been found to exhibit vulnerabilities relating to insecure transmission of sensitive data, while researchers found that the same percentage demonstrated issues around incorrect implementation of session expiration.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Apps

 

Gust MEES's insight:

Three quarters of mobile applications have vulnerabilities relating to insecure data storage, leaving both Android and Apple iOS users open to cyber attacks which could allow hackers to steal sensitive information.

Insecure data storage is just one of a number of vulnerabilities which a security company's researchers said they have found after conducting security assessments of a number of mobile applications for both iPhones and and Google Android devices.

The findings have been outlined in the Vulnerabilities and Threats in Mobile Applications 2019 report from Positive Technologies.

Insecure data storage is by far the most common vulnerability identified in the tested applications, with 76 percent of those examined found to demonstrate this as a security risk, potentially putting the privacy and security of users at risk.

Just over a third of applications (35 percent) have been found to exhibit vulnerabilities relating to insecure transmission of sensitive data, while researchers found that the same percentage demonstrated issues around incorrect implementation of session expiration.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Apps

 

 

No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | ICT Security-Sécurité PC et Internet | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
Gust MEES's insight:

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:42 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

 

Check ALSO:

 

https://twitter.com/settings/applications

 

 

http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html

 

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

 

 

Gust MEES's curator insight, January 22, 2013 11:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/