Smart Home Automation


The dark side of apps

1 September 2019 Smart Home Automation Information Security

Mobile device security threats are on the rise and it’s not hard to see why. In 2019 the number of worldwide mobile phone users is forecast to reach 4.68 billion, of which 2.7 billion are smartphone users. So, if you are looking for a target, it certainly makes sense to go where the numbers are.

Think about it, unsecured Wi-Fi connections, network spoofing, phishing attacks, ransomware, spyware and improper session handling – mobile devices make for the perfect easy target. In fact, according to Kaspersky, mobile apps are often the cause of unintentional data leakage.

“Apps pose a real problem for mobile users, who give them sweeping permissions, but don’t always check security,” says Riaan Badenhorst, general manager for Kaspersky in Africa. “These are typically free apps found in official app stores that perform as advertised, but also send personal - and potentially corporate data to a remote server, where it is mined by advertisers or even cybercriminals. Data leakage can also happen through hostile enterprise-signed mobile apps. Here, mobile malware uses distribution code native to popular mobile operating systems like iOS and Android to spread valuable data across corporate networks without raising red flags.”

In fact, according to recent reports, six Android apps that were downloaded a staggering 90 million times from the Google Play Store were found to have been loaded with the PreAMo malware, while another recent threat saw 50 malware-filled apps on the Google Play Store infect over 30 million Android devices. Surveillance malware was also loaded onto fake versions of Android apps such as Evernote, Google Play and Skype.

Considering that as of 2019, Android users were able to choose between 2.46 million apps, while Apple users have almost 1.96 million app options to select from, and that the average person has 60-90 apps installed on their phone, using around 30 of them each month and launching 9 per day – it’s easy to see how viral apps take several social media channels by storm.

“In this age where users jump onto a bandwagon because it’s fun or trendy, the Fear of Missing Out (FOMO) can overshadow basic security habits – like being vigilant on granting app permissions,” says Bethwel Opil, enterprise sales manager at Kaspersky in Africa. “In fact, accordingly to a previous Kaspersky study, the majority (63%) of consumers do not read license agreements and 43% just tick all privacy permissions when they are installing new apps on their phone. And this is exactly where the danger lies – as there is certainly ‘no harm’ in joining online challenges or installing new apps.”

However, it is dangerous when users just grant these apps limitless permissions into their contacts, photos, private messages, and more. “Doing so allows the app makers possible, and even legal, access to what should remain confidential data. When this sensitive data is hacked or misused, a viral app can turn a source into a loophole which hackers can exploit to spread malicious viruses or ransomware,” adds Badenhorst.

As such, online users should always have their thinking caps on and be more careful when it comes to the internet and their app habits including:

Only download apps from trusted sources. Read the reviews and ratings of the apps as well.

Select apps you wish to install on your devices wisely.

Read the license agreement carefully.

Pay attention to the list of permissions your apps are requesting. Only give apps permissions they absolutely insist on, and forgo any programme that asks for more than necessary.

Avoid simply clicking “next” during an app installation.

For an additional security layer, be sure to have a security solution installed on your device.

“While the app market shows no signs of slowing down, it is changing. Consumers download the apps they love on their devices which in turn gives them access to content that is relevant and useful. The future of apps will be in real-world attribution, influenced by local content and this type of tailored in-app experience will lead consumers to share their data more willing in a trusted, premium app environment in exchange for more personalised experiences. But until then, proceed with caution,” concludes Opil.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved