The eight Android and iOS apps pose a significant security risk to users due to their failure to encrypt sensitive data during transmission were found to send unencrypted information, such as device details, location data, and login credentials, over the HTTP protocol instead of the more secure HTTPS.
This exposes users to potential attacks like data theft, eavesdropping, and man-in-the-middle attacks, as anyone monitoring the network can intercept and access the unencrypted data.
The Klara Weather app, with over a million downloads on the Google Play Store, poses a significant security risk to user privacy. Network traffic analysis and code inspection have uncovered that the app sends user geolocation data over unencrypted HTTP connections.
It means that anyone with access to the network can intercept and steal sensitive location information. The lack of encryption makes the app vulnerable to man-in-the-middle attacks, where malicious actors can easily eavesdrop on the app’s communication and compromise user privacy.
The military dating app MD Date for iOS poses a significant security risk due to its failure to encrypt user credentials. Network traffic analysis and code inspection revealed that sensitive information such as usernames and passwords is transmitted over unencrypted HTTP connections.
The Sina Finance Android app, with over 100,000 downloads on the Google Play Store, poses a significant security risk due to its unencrypted transmission of sensitive device information.
An analysis of its network traffic and code revealed that the app leaks device identifiers, including the device ID, SDK version, and IMEI, over HTTP, making this data vulnerable to interception and misuse, which exposes users to potential identity theft, tracking, and unauthorized access to their devices.
The CP Plus Intelli Serve Android app, with over 50,000 downloads on the Google Play Store, poses a significant security risk due to its insecure transmission of user credentials.
Network traffic analysis and code inspection have confirmed that usernames and passwords are sent unencrypted over HTTP, making them vulnerable to interception and exploitation by malicious actors.
The Latvian Post, HaloVPN, i-Boating, and Texas Storm Chasers mobile apps have been found to transmit sensitive user data, such as geolocation and device information, over unencrypted HTTP connections, which exposes users to privacy risks as the data can be intercepted and exploited by malicious actors.
Network traffic analysis and code inspection have confirmed the presence of unencrypted HTTP requests in these apps, indicating a lack of appropriate security measures to protect user data.
According to Symantec, many mobile app developers fail to adequately protect user data, exposing users to significant risks that persist due to negligence or oversight. To mitigate these risks, developers must use HTTPS for all network traffic, encrypt sensitive data, conduct regular security audits, and prioritize user privacy.
Users should also exercise caution by installing reputable security apps, avoiding untrusted sources, keeping software updated, and being mindful of app permissions. By following these practices, both developers and users can contribute to a more secure mobile app ecosystem.