There are two things wrong with the preconception that cyber criminals rely on tacky, free mobile apps to get victims to leak their financial details, so that the criminals can then empty their bank accounts. First, mobile data leaks also happen via many popular, well-perceived app brands. Second, financial data is only one part of the treasure trove for cyber criminals, who may find even richer gains by using additional, non-financial, personal data.
In the aftermath of the recent attack in London by an alleged terrorist, the popular WhatsApp messaging service has itself become a target of the British Government. The U.K. Home Secretary, Amber Rudd, wants WhatsApp to make end-user content available to British intelligence services. This follows disclosure that the attacker used the messaging service shortly before launching the violent aggressions that claimed the lives of four people.
When it comes to Internet of Things app security, many enterprises are like deer caught in the headlights. They know something bad is going to happen if they don’t make a move. When IoT apps fail to properly protect the data and devices with which they work, damage can range over breach of private personal information, for example in the case of wearables, to sabotage of large systems and machines, such as production lines and power generating turbines.
In May 2018, new data regulation will be enforced. Although General Data Protection Regulation or GDPR is a European initiative, it can affect businesses all over the world, including the likes of Facebook and Google, and FinTech companies. GDPR has been designed to meet the three following goals...
Mobility is now a big deal for the insurance industry. Some insurance companies have developed their own apps to help customers find an insurance agent, or take pictures of damage for claims. Others use third parties to produce mobile apps for both business-to-consumer and business-to-business markets. Unfortunately, all of them are at risk, reputationally or operationally, from mobile app disasters.
“Reckless beyond words” was how well-known whistleblower Edward Snowden recently described the possibility that the US government – more specifically, the CIA – hacked or hid vulnerabilities in mobile devices. He was responding to the release by WikiLeaks of more than 8,000 documents in early March 2017 with alleged details of CIA hacking activities.
Freedom? Security? The jury is still out on the question of which, if either, takes priority. Meanwhile, businesses are forging ahead with “bring your own device” (BYOD) and “bring your own app” (BYOA) policies. Cost reduction is one goal, but so are flexibility and choice for employees, letting them work the way they want to, and bringing businesses the benefit of increased productivity. Freedom gets everyone’s vote. However, employees and enterprises do not necessarily have the same perspective on mobile apps and security.