A report published by Check Point revealed that 23 Android were responsible for exposing the personal data of 100 million users.
Cybersecurity firms are gaining a lot of business and notoriety. And all of it ties back to how much importance we've given to the online world. Personal details, home addresses, social security numbers, credit card details, there's honestly no end to the amount of personal information we have stored up online. Accordingly, there's also no end to the amount of turmoil that the likes of hackers and spam bots can cause to unsuspecting users. That's where cybersecurity firms come in. When once they were only responsible for establishing security for large companies, they can now be contracted on an individual basis. Many even conduct their own research into related matters unprompted, building up a repertoire that'll prove useful down the line with jobs.
Check Point conducted such a research, and we'll delve into it accordingly. The American based cybersecurity firm published a detail report on their findings in the matter. The security flaw shared by all of these 23 Android applications revolves around authentication. Let's explain. Nowadays, many applications store their data on mechanisms such as the cloud, preventing the slew of constantly adding and deleting data from one's physical device. This requires the sharing of real-time data with the cloud based service, and that's where our problems begin.
Many applications, as noted by Check Point, had committed the simple mistake of leaving all their data unencrypted. While there's a wide range of ways to commit such an error, the result is ultimately just as exploit-able. It's a classic case of developer incompetence, and can cost users any sort of damage. From personal identification (i.e. name, address, and photos) to passwords, a lot of user data is at stake. While Check Point hasn't necessarily divulged the names of our 23 apps, it has very much identified the issue as a developer mediated one.
Many developers, instead of patching their weakness, have apparently attempted to cover it up in order to avoid identification. Regardless, via employing the likes of malware identifiers, devs were caught red-handed. Finally, Check Point states that though they've only identified 23 as of yet, there could be many more flying under the radar.
Cybersecurity firms are gaining a lot of business and notoriety. And all of it ties back to how much importance we've given to the online world. Personal details, home addresses, social security numbers, credit card details, there's honestly no end to the amount of personal information we have stored up online. Accordingly, there's also no end to the amount of turmoil that the likes of hackers and spam bots can cause to unsuspecting users. That's where cybersecurity firms come in. When once they were only responsible for establishing security for large companies, they can now be contracted on an individual basis. Many even conduct their own research into related matters unprompted, building up a repertoire that'll prove useful down the line with jobs.
Check Point conducted such a research, and we'll delve into it accordingly. The American based cybersecurity firm published a detail report on their findings in the matter. The security flaw shared by all of these 23 Android applications revolves around authentication. Let's explain. Nowadays, many applications store their data on mechanisms such as the cloud, preventing the slew of constantly adding and deleting data from one's physical device. This requires the sharing of real-time data with the cloud based service, and that's where our problems begin.
Many applications, as noted by Check Point, had committed the simple mistake of leaving all their data unencrypted. While there's a wide range of ways to commit such an error, the result is ultimately just as exploit-able. It's a classic case of developer incompetence, and can cost users any sort of damage. From personal identification (i.e. name, address, and photos) to passwords, a lot of user data is at stake. While Check Point hasn't necessarily divulged the names of our 23 apps, it has very much identified the issue as a developer mediated one.
Many developers, instead of patching their weakness, have apparently attempted to cover it up in order to avoid identification. Regardless, via employing the likes of malware identifiers, devs were caught red-handed. Finally, Check Point states that though they've only identified 23 as of yet, there could be many more flying under the radar.