You are on page 1of 2

Introduction

Mobile applications are hot and hilarious!


Tens of eco-systems, hundreds of app stores, thousands of categories, and millio
ns of mobile applications out there! And they are being downloaded by the millio
ns every day.
What we store in phones go beyond our own imagination, interestingly this expone
ntially increases over time.
Web we got thrilled, amused, used and finally we understood. Mobile landscape to
ok us by a wave and since no time is left to think all we did it is got excited
the way it serves. Even those who thinks why it serves me this much can't fully
understand the threat landscape of mobile applications. Many suspect and few pro
ve that hacking mobile applications is pretty easier due to its extended surface
.
As cyber war evolves not only between Goverments, not only between corporate riv
als but between a user's wish and resent. Mobile applications have become the na
tural choice of hackers as the preferred vector of attack as it has more to offe
r apart from its extended surface.
We have intensely developed a mobile application information security score card
which represents the level of security that the mobile application could offer.
Whether Android, iOS, Windows Phone apps or whatever platform you may use, we ar
e here to provide you with a full cycle of services to assure your next app you
use handles your data definitely the way you want.
What ?
Almost everything! You have to admit that we have begun living our lives on our
phones.Right from when did you wake up and retire till what, when and where did
you gifted your girl friend.
How ?
Theft
Time and again it has been proven that deliberate attacks on systems and individ
uals who have access to sensitive data can cause more harm than inadvertent expo
sure. Insiders are the number one cause of data breaches, while hackers pose les
ser risk as they target mostly enterprises who by little sense would have the ba
sic defence.
Loss
Surveys and studies show that
nother way. On a simple note,
ir way to a storage facility,
e common ways data can end up

inadvertent exposure due to the loss of media is a


backup tapes or paper files being misplaced on the
or laptops left behind at airports or in taxis, ar
in the hands of unauthorized people.

Neglect
Generous enough to allow your mobiles and tablets remember your passwords, takin
g backup in free servers without assessing their security level is another commo

n way of voluntary exposure to risk.


Insecure Practices
using systems and granting permissions without understanding the gravity of the
act is one frequently used insecure practice. Both the user and the app develope
r are equally responsible as Collecting, storing, sending, encrypting, finding a
nd removing data may all have implications for its safety. Those who are handlin
g sensitive data, may find they are doing one or more of these activities. If pr
oper safety precautions are not taken, inadvertent data exposure could be the re
sult.

You might also like