Security research labels over 290,000 Google Play Android apps as 'high-risk'
Security vendor Bit9 categorized these Android apps as "questionable" or "suspicious" because they could gain access to personal information to collect GPS data, phone calls or phone numbers and much more after the user granted "permission" to the app. "You have to say 'yes' to the application or it won't run," pointed out Harry Sverdlove, Bit9 CTO. Games, entertainment and wallpaper apps especially seem to want to grab data, even though the their functions would seem to have little direct use for it.
Bit9 notes this doesn't mean these apps are malware per se, but they could do damage if compromised because the user has granted so much permission.
There are said to be about 600,000 apps in Google Play, and Sverdlove says Bit9 is now compiling a "reputation" database of Android apps. The firm is also going to move on to other app stores, including those from Apple and Amazon, in order to create mobile security products that can protect users based on risk-scoring of apps.A
Reputation-based approaches have become commonly used throughout the security industry for protecting Web users, for example, against malware-infested sites, and now there's interest in applying similar ideas to analyzing risk associated with mobile apps.
Broken down, Bit9 categorized these "questionable" and "suspicious" apps it found in Google Play this way:
* 42% access GPS location data, and these include wallpapers, games and utilities
* 31% access phone calls or phone numbers
* 26% access personal data, such as contacts and email
* 9% use permissions that can cost the user money
In its report, Bit9 describes its methodology as crawling Google Play to collect detailed information about 412,000 mobile apps, including publisher, popularity, user rating, category, number of downloads, requested permissions and price.
Of the 412,222 Android apps evaluated from Google Play, Bit9 says more than 290,000 of them access at least one high-risk permission, 86,000 access five or more and 8,000 apps access 10 or more permissions "flagged as potentially dangerous." It defined risk level according to relative degrees of privacy intrusion and the app's feature set, perhaps the ability to wipe devices or change systems settings.
The study also included a survey of 138 IT professionals responsible for mobile security for over 400,000 users in their organizations. It found:
* 78% think phone makers do not focus enough on security, but 71% allow employee-owned devices to access their organization's network.
* Only 24% deploy some form of app monitoring or control to grant visibility into employees' devices.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts