November 27, 2013 By Diana Kelley 2 min read

This is a weekly post where we address questions of interest to the Application Information Security Community. To that end, we’d love to hear your questions! Please Tweet us with the hashtag #ThinkAppSec or leave us a comment below and we’ll pick one or two questions from that list.

This week I was in Boston Chairing the Mobile and Smart Device Security Conference. This weeks questions were inspired by speaker sessions and questions from the audience.


1. Which Apps are More Secure Android or iOS?

Charlie Miller, renowned mobile security researcher now working full time on security for Twitter delivered the Kick-Off Keynote and had strong opinions about this. He came down squarely on the side of iOS apps being less risky than Android apps, in part because of the checks that apps have to go through at Apple before being approved for the iTunes store. For more on Charlie’s take, please check out this article at InfoSecurity Magazine.

But “secure” may depend on your definition. A recent AppThority report tagged 100% of iOS as being “risky” for sending and receiving sensitive data that’s not encrypted. By comparison, only 92% of the Android apps in the report failed to protect sensitive data in transit. The same report found 54% of IOS apps have access to a user’s contact list while only 20% of Android apps do. And, perhaps not surprisingly, Google’s Executive Chairman, Eric Schmidt has publicly stated that Android is more secure than iOS.

Arguably, the better question for an enterprise to ask, is are the apps we’re using secure enough to protect our business and customers regardless of what platform they’re running on.

2. Are Mobile Application Reputation Services valuable to Enterprises?

This is a bit of a tricky one! The excellent speakers from Bishop Fox who delivered the talk “Mobile Application Security: Testing and Code Review” were doubtful of the value of these services and that sentiment was echoed by people I spoke with directly. Many of the attendees hadn’t started using them yet. There was also quite a bit of confusion about what mobile application reputation is and whether or not it overlaps with mobile anti-virus. A few attendees were consuming mobile app rep feeds and using them to determine white and blacklisting in the MDM (mobile device management) console.

What are you hearing in regards to mobile app rep? Is it a priority for 2014? Does it provide value to the Enterprise?

Previous Weeks

Week 1- What is the importance of software security in supply chain management?

Week 2 – Who Should be Responsible for Application Security Testing?

Week 2 – Can “generated code” be tested?

Week 3 – How do we secure application vulnerabilities and code development, particularly for mobile and social applications that are built by business units or reside on the cloud?

Week 3 – As a CISO, how can I control my organization’s testing methodologies, change management and deployment processes, without compromising on quality and project timelines?

Week 4 – Will the legal landscape change if software vendors can be sued without damages or loss being proven?

Week 4 – What is PII – How much can the definition expand?

Submit your questions via Twitter using #ThinkAppSec


More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today