Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

1/13/2016
11:05 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Arxans 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

While 84 percent of consumers and IT execs believe their mobile health and finance apps are secure; 90 percent of mobile health and finance apps test positive for two critical security risks

BETHESDA, MD – January 12, 2016 – Arxan Technologies, the leading provider of application protection solutions, today announced the publication of its 5th Annual State of Application Security Report. The new research is based on the analysis of 126 popular mobile health and finance apps from the US, UK, Germany, and Japan, as well as a study examining security perspectives of consumers and app security professionals.

Arxan discovered a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations address known application vulnerabilities. While the majority of app users and app executives indicate that they believe their apps to be secure, nearly all the apps Arxan assessed, including popular banking and payment apps and FDA-approved health apps, proved to be vulnerable to at least two of the top 10 serious security risks. 

Among the research findings:

Consumers and app executives believe their mobile health and finance apps are secure. A combined 84 percent of mobile app users and mobile app executives believe that their mobile health and finance apps are “adequately secure,” and 63 percent believe that app providers are doing “everything they can” to protect their mobile health and finance apps.

  • The majority of mobile health and finance apps contain critical security vulnerabilities. 90 percent of the mobile health and finance apps tested had at least two of the Open Web Application Security Project (OWASP) Mobile Top 10 Risks. More than 80 percent of the health apps tested that were approved by the US Food and Drug Administration (FDA) or the UK National Health Service (NHS) were also found to have at least two of the OWASP Mobile Top 10 Risks.
  • The security and safety risks are real and significant. 98 percent of the mobile apps tested lacked binary protection – this was the most prevalent security vulnerability identified. 83 percent of the mobile apps had insufficient transport layer protection. Such vulnerabilities could result in application code tampering, reverse-engineering, privacy violations, and data theft. In addition to sensitive data being taken, the vulnerabilities could lead to a health app being reprogrammed to deliver a lethal dose of medication, or a finance app to redirect the transfer of money.
  • Most consumers would change providers if they knew their apps were not secure. 80 percent of mobile app users would change providers if they knew the apps they were using were not secure. 82 percent would change providers if they knew alternative apps offered by similar service providers were more secure.

“Mobile apps are often used by organizations to help keep customers ‘sticky,’ yet in the rush to bring new apps to market, organizations tend to overlook critical security measures that are proving crucial to consumer loyalty,” said Patrick Kehoe, CMO of Arxan Technologies. “Our research in Arxan’s 2016 State of App Security Report demonstrates that mobile app security is an important element in customer retention. Baking in robust mobile app security is not only a smart technology investment to keep the bad guys out, but also a smart business investment to help organizations differentiate from the competition and to achieve customer loyalty based on trust.”

Research findings specific to the Health and Finance markets included:

Health Highlights

  • Mobile health apps approved by regulatory/governing bodies are just as vulnerable as other mobile apps. 84 percent of the US FDA-approved apps tested did not adequately address at least two of the OWASP Mobile Top 10 Risks. Similarly, 80 percent of the apps tested that were formerly approved by the UK NHS did not adequately address at least two of the OWASP Mobile Top 10 Risks.
  • Most of the mobile health apps were susceptible to application code tampering and reverse-engineering. 95 percent of the FDA-approved apps, and 100 percent of the apps formerly approved by the NHS, lacked binary protection, which could result in privacy violations, theft of personal health information, and tampering.

Finance Highlights

  • All of the top mobile banking and payment apps tested had at least one OWASP Mobile Top 10 Risk. 100 percent of the mobile finance apps tested, which are commonly used for mobile banking and for electronic payments, were shown to be susceptible to code tampering and reverse-engineering.
  • Android apps were shown to be more secure than iOS apps. 59 percent of the Android mobile finance apps tested had at least three OWASP Mobile Top 10 Risks, whereas 100 percent of the iOS apps tested had at least 3 top risks.

In its research, Arxan found few geographical discrepancies in mobile app security across the US, UK, Germany, and Japan, and iOS apps were shown to be at least as vulnerable as Android apps.

 

Infographics - Report - Methodology

The full 2016 Arxan State of Application Security Report with methodology, consolidated (mobile health and finance), health-specific and finance-specific findings can be accessed here.

 

About Arxan Technologies

Arxan makes the world’s applications universally secure and trusted.  Our unique patented guarding technology 1) Defends applications against attacks, 2) Detects at run-time when an attack is being attempted, and 3) Responds to detected attacks to stop them, alert, or repair. Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IoT) – and is currently protecting applications running on more than 500 million devices across a range of industries, including: financial services, high tech/independent software vendors (ISVs), manufacturing, healthcare, digital media, gaming, and others. The company’s headquarters and engineering operations are based in the United States with global offices in EMEA and APAC.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.