Date:05/04/21
On the average, each such program has 39 information security issues. Total company discovered 3137 unique vulnerabilities. They can potentially lead to leakage of confidential data.
According to the company, vulnerabilities appear in applications as a result of using the developers of fragments of the open source code, which are written for a long time, but continue to be used in primeval form to this day.
Mobile Application Study Head Positive Technologies Nikolai Anisenya explained that the developers often use open source code because it allows companies to save time and money, as well as avoid programming errors.
Sometimes vulnerabilities are not caught in old codes consciously, since the test is an expensive procedure that not every company-developer can afford.
Earlier it was reported that a dangerous application for Android smartphones has grown user data. The company’s specialists discovered malicious software in the network, which was disguised as the Android service. In fact, the application is a Trojan, which accepts commands from a specific hacker server. The task of the program is to get the maximum amount of data from the compromised device.
Vulnerabilities detected in most of most popular Android apps
Most (60 percent) of the most popular Android applications have at least one vulnerability, Synopsys has discovered. This is stated in the material “Izvestia”.On the average, each such program has 39 information security issues. Total company discovered 3137 unique vulnerabilities. They can potentially lead to leakage of confidential data.
According to the company, vulnerabilities appear in applications as a result of using the developers of fragments of the open source code, which are written for a long time, but continue to be used in primeval form to this day.
Mobile Application Study Head Positive Technologies Nikolai Anisenya explained that the developers often use open source code because it allows companies to save time and money, as well as avoid programming errors.
Sometimes vulnerabilities are not caught in old codes consciously, since the test is an expensive procedure that not every company-developer can afford.
Earlier it was reported that a dangerous application for Android smartphones has grown user data. The company’s specialists discovered malicious software in the network, which was disguised as the Android service. In fact, the application is a Trojan, which accepts commands from a specific hacker server. The task of the program is to get the maximum amount of data from the compromised device.
Views: 5182
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World