Visa Europe revealed important stats about the usage of Contactless Cards. Poland, Spain and the UK use this payment methd the most, with UK usage growing by 300% year over year.
About 180 billion downloads of mobile apps; that’s an astonishing figure, but it’s a reality. According to Statista, that’s how many times people will download apps on Android, Windows and iOS devices in 2015.according to Statista.
But there is more. Statista’s data shows that in 2017, we can expect approximately 270 billion app downloads. When we talk about mobile apps, we are talking about one of the fastest growing businesses - think that in 2009 the amount of downloads was 2.500 millions, a number that will be 100 times bigger in less than 2 years from now.
1.6 million apps are currently available from the Google Play marketplace, while 340,000 are available for Windows Phone users. Apple’s App Store, meanwhile, reported 100 billion cumulative downloads between July 2008 and June 2015.
Many of these apps are free, while other cost money. One thing they have in common? They all access a small or a big piece of your personal data. Are you sure that you are sharing your personal details with a trustable application? Does your favourite app leak your personal data? Do the organizations that collect your personal data through mobile apps, protect it well enough?
Your mobile is not just a phone, it’s much more. It is a complex device that allows you access the Internet, buy products, check your bank account or even control your home appliances. It is arguably the most important belonging you have because of the information it holds. It is the key to accessing your personal life, the tool that puts you in touch with your most important data.
Cyber criminals know that and they will try everything possible to steal your data, from creating malicious apps to modifying trusted and legitimate applications and distributing them through unofficial channels (beware of cracked apps) to embed malware.
First and foremost, all developers must be aware of the typical security risks that affect mobile applications. To be able to develop secure by design mobile apps, we strongly suggest you to read the OWASP Mobile Security Project - Top Ten Mobile Risks. This project highlights the most common security issues that affect mobile applications which have not been developed with security in mind.
But when it comes to developing secure mobile applications, where should you begin? Bring IT Security into your Software Development Life Cycle (SSDLC) by making sure that security concepts and processes are taken into consideration from the earliest stages of the Software Development Life Cycle. You need to consider whether your security measures are sufficient during each and every stage.
If you are the final user of an app, then here is a short checklist that will help you to manage your applications and do the right thing when you decide to install them onto your device. When you install an app, you are exposed to several risks, so make sure that you take your time before installing software onto your device
This is probably the most effective decision you can take. Secure Software Development Life Cycle is a discipline that merges the ability and methodologies of software and app development with the knowledge of cyber security experts, in one process from the earliest stages of your app development.
Going through the various steps of your SDLC in a secure way is not as difficult as you might think. You can get your team trained by SSDLC experts and to stay constantly in control of your application, design it in a secure way and be able to spot weaknesses that could lead to security issues.
Make sure that you develop secure software. Find out more on how to do this by getting in touch with our team of experts.
I am the Founder of Advantio.
Technology has been my passion since I was a kid; when I first heard the handshake of an old 300bps modem I realised security would be key in an interconnected world. Since then it has become my passion and primary focus.
The reason why I've started my own business is to make IT Security simple.
Certifications: CISSP / CCSA (Checkpoint) / ITIL Foundations / ACSA (ArcSight)/ Linux+/ PCI-QSA / PA-QSA