SlideShare a Scribd company logo
INFORMATION SECURITY
THREATS AGAINST MOBILE
PHONE SERVICES
MUHAMMAD ANEES UL REHMAN
MCS
Major Factors
W
Unencrypted Data
02
Third Party Apps
01
Poor Server Side Security
03
Poor App Security Testing
04
Unstructured Data Input Channel
05
Whether to cut costs or to save time, developers often opt for third-party frameworks when building
their apps. Though there's nothing particularly wrong with using ready-made frameworks and
codes, it is a risky move simply because hackers release several such frameworks to target unwitting
developers.
Third Party Apps
W
Unencrypted
Data
Failing to use encryption algorithms to protect user data is a
mistake many app developers have been punished for
severally. Leaving sensitive user data in plain text format was
a miscalculation that caused the Starbucks app to drop
several pegs from its position as one of the top five highest
grossing apps.
Poor Server Side
Security
Developers work hard to provide the best security for their
mobile apps, often at the cost of server-side security. It
isn't rare to see an app developer completely neglecting to
secure the server-side while implementing strong security
measures for the client-side of the app.
Poor App Security
Testing
When developing the custom app, the process of testing
the app should be done even before a release plan is
conceived. The testing phase of the app covers how
usable and compatible it is, but most importantly, how
secure it is.
W
Unstructured
Data Input
Channel
Applications are known to accept data from multiple sources
even when said sources lack sufficient encryption. Attackers
often use these unsecured input channels to gain access to
cookies and environmental variables stored by the app.
Infromation Security Threats Against Mobile Phone Services

More Related Content

Similar to Infromation Security Threats Against Mobile Phone Services

Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
Cerebrum Infotech
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
IBM Security
 
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdfWhat is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
Cyber security professional services- Detox techno
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
IBM Security
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Colin English
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
venkatprasadvadla1
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
Security overview 2
Security overview 2Security overview 2
Security overview 2
CMR WORLD TECH
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
The 10 Commandments Security Of Mobile App Development
The 10 Commandments Security Of Mobile App DevelopmentThe 10 Commandments Security Of Mobile App Development
The 10 Commandments Security Of Mobile App Development
Mobio Solutions
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics
 
Mobile application security Guidelines
Mobile application security GuidelinesMobile application security Guidelines
Mobile application security Guidelines
Entersoft Security
 

Similar to Infromation Security Threats Against Mobile Phone Services (20)

Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdfWhat is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Security overview 2
Security overview 2Security overview 2
Security overview 2
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
The 10 Commandments Security Of Mobile App Development
The 10 Commandments Security Of Mobile App DevelopmentThe 10 Commandments Security Of Mobile App Development
The 10 Commandments Security Of Mobile App Development
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Mobile application security Guidelines
Mobile application security GuidelinesMobile application security Guidelines
Mobile application security Guidelines
 

Infromation Security Threats Against Mobile Phone Services

  • 1. INFORMATION SECURITY THREATS AGAINST MOBILE PHONE SERVICES MUHAMMAD ANEES UL REHMAN MCS
  • 2. Major Factors W Unencrypted Data 02 Third Party Apps 01 Poor Server Side Security 03 Poor App Security Testing 04 Unstructured Data Input Channel 05
  • 3. Whether to cut costs or to save time, developers often opt for third-party frameworks when building their apps. Though there's nothing particularly wrong with using ready-made frameworks and codes, it is a risky move simply because hackers release several such frameworks to target unwitting developers. Third Party Apps
  • 4. W Unencrypted Data Failing to use encryption algorithms to protect user data is a mistake many app developers have been punished for severally. Leaving sensitive user data in plain text format was a miscalculation that caused the Starbucks app to drop several pegs from its position as one of the top five highest grossing apps.
  • 5. Poor Server Side Security Developers work hard to provide the best security for their mobile apps, often at the cost of server-side security. It isn't rare to see an app developer completely neglecting to secure the server-side while implementing strong security measures for the client-side of the app.
  • 6. Poor App Security Testing When developing the custom app, the process of testing the app should be done even before a release plan is conceived. The testing phase of the app covers how usable and compatible it is, but most importantly, how secure it is.
  • 7. W Unstructured Data Input Channel Applications are known to accept data from multiple sources even when said sources lack sufficient encryption. Attackers often use these unsecured input channels to gain access to cookies and environmental variables stored by the app.