Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan’s State of Mobile App Security report, 2014. These attackers use the infected apps to gain entry to the enterprise in order to compromise its most treasured information.
Don’t assume that BYOD security tools are keeping enterprise data safe from the effects of these fictitious apps. The business should not trust that perimeter security is doing the job either. It takes a combination of approaches and resources to thwart cloned mobile apps, and even then the enterprise will never be bulletproof. [See examples of cloned apps in our slideshow]
Follow CSO on a journey from the point of app innocence lost to network infiltration and data compromise, winding up with methods to defend against the mutated mobile monsters that these hoodlums hack and deploy.
To continue reading this article register now