Risk
7/27/2010
04:01 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

'App Genome Project' Exposes Potential Smartphone Risks

Researchers from Lookout will present their findings thus far in study of freebie Android, iPhone apps

Android smartphone applications typically don't have as much access to private information, such as location and contact lists, as many iPhone apps do, but they're more likely to contain potentially dangerous third-party code, according to a sneak peek at new research that will be revealed at Black Hat USA this week.

Click here for more of Dark Reading's Black Hat articles.
Researchers from Lookout, a smartphone security company, are releasing new data from their so-called "App Genome Project," which scans and maps smartphone apps to pinpoint threats and privacy risks. The project has mapped the behavior of 100,000 smartphone apps and has scanned about 300,000 so far. Among the preliminary findings: Thirty-three percent of free iPhone apps have the ability to see the smartphone user's physical location, while 29 percent of free Android apps can do the same. And 14 percent of free iPhone apps can access a user's contact list, while 8 percent of free Android apps can do so.

One Android wallpaper app sends the user's phone number to the developer, for example.

Meanwhile, close to half of Android apps (47 percent) come with third-party code -- mainly for advertising or analytics purposes -- that can access sensitive smartphone data, exposing other security and privacy risks, according to the App Genome Project. About 23 percent of freebie iPhone apps have the same problem, the researchers say.

But the researchers say their data doesn't conclude that one smartphone is more secure than the other. "Each platform has different security measures that we believe will drive how and where the risks in each platform develop," says Kevin Mahaffey, co-founder and CTO at Lookout.

The smartphone project focuses on free apps found in the Android Market and the iPhone App Store. Lookout reported last month more than twice the number of malware and spyware programs were hitting BlackBerry, Windows Mobile, and Android phones versus six months ago.

Lookout says the iPhone's permission model makes it easier for third-party code to shape the app's features. For an Android app to interact with the user's address book, it would need to implement both the third-party code and request permission from the operating system to get to the contacts, the researchers say.

"The major differences are Android's use of a permission-based model and a community-enforced marketplace versus Apple's less-granular permission model and curated marketplace," Mahaffey says. "Specifically, Android gives users insight into the data accessed by applications they download so they can make security and privacy decisions. Apple, on the other hand, reviews the appropriateness of data access by applications when they are submitted to the App Store: For example, applications are not to access location if they only do so for advertising purposes."

Some recommendations for Smartphone users from Lookout:

1. Only download applications from trusted sources. Check out the number of downloads and recommendations for the app. Run a security app on your phone for checking downloads.

2. Download updates for apps regularly, especially banking and payment apps

3. Be careful when logging into apps that access sensitive data.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.