Security in the network is becoming increasingly important, and that is that traffic with our data moves a market that is superior to many goods that are shaped. However, those who do not take our data so seriously are the creators of some of the most important applications in the current mobile software landscape. According to one last report, Up to seventy-six of the most popular applications we can find in the iOS App Store are not safe enough as to meet current standards. We are going to take a little look at this data and know how easy it is for us to steal the information when we navigate on our iPhone using this type of qualified insecure applications.
From the hand of MacRumors that has accessed the report of Strafach, We have known this current security situation in our mobile devices. The WiFi seems to be the key to them, and once again, it is insufficient encryptione and the little interest on the part of the developers which leaves us totally exposed in this aspect. Therefore, we should all begin to seriously consider stopping using these types of applications. Honestly, their developers put little interest in improving the encryption and protocol of these applications precisely because they know that users are not going to stop using it, and it is that software consumers do not care about insecurity as long as they do not touch it the pocket.
The CEO of Sudo Security Group Will Strafach, has emphasized precisely the fact that many of the applications considered the best or the most used are in some cases the real champions of this insecurity and these insufficient encryption protocols. And it would be hypocritical not to talk about certain applications now, when WhatsApp encryption has been insufficient until recently, and we have not lost the opportunity to point out these deficiencies of the most popular messaging application in the world.
How exposed are we to this threat?
The input method is almost an old-fashioned story, The applications included in this list of doubtful honor do not have a security protocol for the transport of packages. If you are curious, you can directly access the article that Will Strafach has added in Medium directly in THIS LINK.
In short, the Wi-Fi connection and data transfer through our mobile device and The WiFi router is the key point to intercept the information we want to captureIn this way, and since this layer of information transport is not protected, anyone with the necessary knowledge and almost no type of impediment can be made with the access data and other information available on the connection.
By this we do not mean that all of our information is at risk, in fact, iOS is one of the systems that pays more attention to this type of security measures and the content is fully encrypted. However, what Apple cannot prevent is that the applications that use content that we have introduced ourselves (since they request them, such as passwords and our family data) transmit this kind of delicate information between the card WiFi network of the iPhone and the router in question.
Some background of applications that have been improving
This problem does not come from now, they have been analyzing applications for some time that did not prevent this data from being intercepted in any way. Examples of the strongest are PayPal or even Kaspersky's "secure browser" no less.
In short, WhatsApp, for example, has long since included a point-to-point encryption that has been busy promoting hype and saucer since its launch. So that, let's analyze if it is really worth exposing ourselves to this type of risk just by using these applications.
The best accessories for your iPhone
Are you looking for a new case for your iPhone? An accessory for the Apple Watch? Maybe a Bluetooth speaker? Do not miss these offers on accessories and get the most out of Apple's mobile: