This is a weekly post where we address questions of interest to the Application Information Security Community. To that end, we’d love to hear your questions! Please Tweet us with the hashtag #ThinkAppSec or leave us a comment below and we’ll pick one or two questions from that list.

This week I was in Boston Chairing the Mobile and Smart Device Security Conference. This weeks questions were inspired by speaker sessions and questions from the audience.


1. Which Apps are More Secure Android or iOS?

Charlie Miller, renowned mobile security researcher now working full time on security for Twitter delivered the Kick-Off Keynote and had strong opinions about this. He came down squarely on the side of iOS apps being less risky than Android apps, in part because of the checks that apps have to go through at Apple before being approved for the iTunes store. For more on Charlie’s take, please check out this article at InfoSecurity Magazine.

But “secure” may depend on your definition. A recent AppThority report tagged 100% of iOS as being “risky” for sending and receiving sensitive data that’s not encrypted. By comparison, only 92% of the Android apps in the report failed to protect sensitive data in transit. The same report found 54% of IOS apps have access to a user’s contact list while only 20% of Android apps do. And, perhaps not surprisingly, Google’s Executive Chairman, Eric Schmidt has publicly stated that Android is more secure than iOS.

Arguably, the better question for an enterprise to ask, is are the apps we’re using secure enough to protect our business and customers regardless of what platform they’re running on.

2. Are Mobile Application Reputation Services valuable to Enterprises?

This is a bit of a tricky one! The excellent speakers from Bishop Fox who delivered the talk “Mobile Application Security: Testing and Code Review” were doubtful of the value of these services and that sentiment was echoed by people I spoke with directly. Many of the attendees hadn’t started using them yet. There was also quite a bit of confusion about what mobile application reputation is and whether or not it overlaps with mobile anti-virus. A few attendees were consuming mobile app rep feeds and using them to determine white and blacklisting in the MDM (mobile device management) console.

What are you hearing in regards to mobile app rep? Is it a priority for 2014? Does it provide value to the Enterprise?

Previous Weeks

Week 1- What is the importance of software security in supply chain management?

Week 2 – Who Should be Responsible for Application Security Testing?

Week 2 – Can “generated code” be tested?

Week 3 – How do we secure application vulnerabilities and code development, particularly for mobile and social applications that are built by business units or reside on the cloud?

Week 3 – As a CISO, how can I control my organization’s testing methodologies, change management and deployment processes, without compromising on quality and project timelines?

Week 4 – Will the legal landscape change if software vendors can be sued without damages or loss being proven?

Week 4 – What is PII – How much can the definition expand?

Submit your questions via Twitter using #ThinkAppSec


More from Application Security

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

12 min read - ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

12 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

17 min read - Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put a spotlight on this capability and learn more about its potential impact. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used…

17 min read