Businesses at risk from poor third-party software, mobile apps

Andoird alien
Insecure mobiles could spill threats into companies

Companies may be using poorly encrypted or misconfigured mobile software, leaving them vulnerable to attack, says HP.

HP Security Research has released its Cyber Risk Report 2013, aiming to identify the top security vulnerabilities for enterprises.

The latest report highlights factors that are contributing the most to the growing cyberattack threat. Among these are the increased reliance on mobile devices, the increased use of insecure software and the growing use of Java.

The risk factor that mobile devices bring to companies was especially prevalent in HP's study. In testing 500,000 Android mobiles, HP report finding "major discrepancies" between what was classed as malware and what was not.

A further 46 per cent of apps studied in the survey also used encryption improperly. Developers are using weak algorithms or misusing strong ones, according to HP, rendering their protection ineffective.

Expanding threats

HP also reports that despite the continued research into security risks and vulnerabilities, the number of publicly disclosed attacks has decreased by 6 per cent year over year.

The survey offers some recommendations for securing businesses and companies from cyberattack. Among these are remaining vigilant about potential pitfalls in security software and third-party code, keeping a well-qualified group of staff to effectively recognise threats and collaborating and sharing intelligence with the cyber security industry.

"The industry must band together to proactively share security intelligence and tactics in order to disrupt malicious activities driven by the growing underground marketplace," said Jacob West, chief technology officer, Enterprise Security Products, HP. "Adversaries today are more adept than ever and are collaborating more effectively to take advantage of vulnerabilities across an ever-expanding attack surface."

TOPICS
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 16 (game #1147)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 16 (game #378)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 16 (game #644)
Three iPhone 16 handsets on show
Apple could launch an iPhone 17 Ultra this year – but we've heard these rumors before