Tag Archives android

All You Need to Know About Android App Vulnerability: Insecure Communication

The Open Web Application Security Project (OWASP) has listed Insecure Communication as the third most exploited risk in mobile applications. As the name suggests, Insecure Communication refers to mobile app vulnerability where sensitive data is intercepted while it's traveling across the wire. This type of mobile app vulnerability is most common since the majority of applications exchange data in a client-server fashion.  When the data is transmitted, it…

All You Need to Know About Android App Vulnerability: Insecure Authentication

The Open Web Application Security Project (OWASP) has listed Insecure Authentication as the fourth most exploited risk in mobile applications. Insecure Authentication exploits vulnerable authentication schemes by faking or bypassing authentication. They do so by submitting service requests to the mobile app’s backend server, in order to bypass any direct interaction with the mobile app. The attacker carries out this process via mobile malware…

All You Need to Know About Android App Vulnerability: Insufficient Cryptography

The Open Web Application Security Project (OWASP) has listed Insufficient Cryptography as the fifth most exploited risk in mobile applications. Insufficient Cryptography or insecure usage of cryptography is a common vulnerability in mobile apps that leverage encryption. Due to weak encryption algorithms or flaws within the encryption process, the potential hacker is able to return the encrypted code or sensitive data to its…

All You Need to Know About Android App Vulnerability: Improper Platform Usage

The Android App Vulnerability "Improper Platform Usage" is listed on the Owasp List of top 10 mobile vulnerabilities. It refers to misuse of a platform's feature or failure to use platform security controls. It includes Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system. The vulnerability in this…

Close