Skip to content
  • +55 (11) 3375 0133
  • contato@nova8.com.br
Linkedin-in Facebook-square Instagram Youtube
  • EN-US
  • PT-BR
  • ES-MX
Nova8
  • About us
  • Portfolio

    Snyk

    Security for Developers

    Upwind

    Cloud Security platform

    Cequence

    API security platform

    CORO

    Simplified Cybersecurity

    IRONSCALES

    Application security testing for companies

    Checkmarx

    Application security testing solution

    Inviciti

    Web Security Tool for Vulnerability Detection

    See all solutions
  • Services

    VAD

    The only Value-Added Distributor (VAD) in Latin America mentioned in the Gartner Market Guide

    Center of Excellence Nova8 in Cybersecurity

    Accelerate your technical and strategic training with Nova8's innovation hub.

    Nova8 Consulting in Cybersecurity

    Strategy, efficiency and real protection for critical applications and data.

  • Cases
  • Blog
Contact us
Nova8
  • Home
  • Blog
  • Common Oversights in Mobile App Security

Specialized knowledge

Common Oversights in Mobile App Security

  • Nova8 Security Research Team
  • August 8, 2016
  • Audit

Aug 02, 2016 By Kevin Beaver

Mobile apps arguably have the greatest number of security flaws of any enterprise system – and no one seems to know much about them. Mobile app security flaws are numerous across all types of business apps. But why?

Perhaps it’s the mentality that “it’s just an app” or the reality that many business owners, especially those in smaller businesses who might not have advanced security, fall for the marketing hype of “we’ve got to have a mobile app,” without including security in the discussion. Mobile apps are as complex as ever, yet the security flaws are very predictable – and the bad guys know it.

Recent examples of the technical security flaws in mobile apps I’ve found include:

  • Unencrypted communication sessions
  • Weak passwords
  • Hard-coded passwords and cryptographic keys often for connecting to critical back-end systems
  • SQL injection
  • Sensitive information left behind, even after uninstalling

Vulnerabilities such as these can quickly create business risks, not to mention compliancegaps for PCI DSS, HIPAA and so on.

What does it take to find and eliminate these security flaws or, better yet, avoid them altogether?  These things are largely dependent on acknowledging the challenges in the first place. Mobile apps need to be part of your information risk management program which means that they need to be tested ideally during the SDLC or, worst-case, during ongoing security assessments or after any code or application environment changes are made. You need to look at your mobile apps from the perspectives of penetration testing, forensics, andsource code analysis because they’re all going to uncover different things.

Free Resources for Mobile App Security

I’m also a big proponent of using resources from outside parties – especially when they’re free. Good examples include the following:

  • OWASP Mobile Security Project
  • Cloud Security Alliance Mobile Working Group’s June 2016 whitepaper Mobile Application Security Testing Initiative
  • Mobile Health App Developers: FTC Best Practices
  • NIST Special Publication 800-163 Vetting the Security of Mobile Applications

Mobile apps not only present great business opportunities but also opportunities for ill-gotten gains. Even if they are seemingly benign marketing or field apps that process and store nothing of value, they can serve as an entry point or steppingstone into a bigger environment that can be used against you and your business. You wouldn’t let that happen with web applications – mobile apps should be no different.

Browse by topic

  • Blog
  • Cases
  • Nova8 Ecosystem
  • Cybersecurity Distribution
  • Market Strategy
  • value-added distributor
  • Security
  • Audit
  • Security management
  • Checkmarx

Browse by solutio

  • Cequence
  • Checkmarx
  • Coro
  • Ironscales
  • Snyk
  • Upwind

Stay ahead of cyber threats

Explore our Insights section and stay up to date with the latest trends in cybersecurity.

Learn more
Brief CX
  • January 2, 2026
  • Blog

Checkmarx One: Unified Enterprise Application Security Platform

Read more
O futuro agentic do AppSec como medir impacto e proteger o SDLC impulsionado por IA
  • December 19, 2025
  • Blog

The agentic future of AppSec: how to measure impact and protect the AI-driven SDLC

Read more
CORO Case Study - ECKO (Apresentação)
  • September 19, 2025
  • Coro

ECKOmining strengthens its cybersecurity strategy with Coro and gains operational efficiency with a lean team

Read more
Linkedin-in Facebook-square Instagram Youtube

Al. Rio Negro, 585 - Torre Jaçarí - 13º andar
Conjunto 134 - Alphaville, Barueri - SP, 06454-000

  • +55 (11) 3375 0133
  • contato@nova8.com.br

Company

  • About us
  • Events
  • VAD
  • Center of Excellence
  • Consulting
  • Work at Nova8
  • Privacy Policy
  • Code of Ethics

Portfolio

  • Snyk
  • Upwind
  • Cequence
  • CORO
  • IRONSCALES
  • Checkmarx
  • Invicti
  • Bright
  • Riskified
  • MazeBolt
  • Mend
  • Request a quote

Content

  • Clients and Cases

Copyright © Nova 8 Cybersecurity - 2025 - Todos os direitos reservados

Desenvolvido por Tech4Biz

Search
Nova8
  • EN-US
  • PT-BR
  • ES-MX
  • About Us
  • Portfolio
    • CORO
    • Upwind
    • Cequence
    • CORO
    • IRONSCALES
    • Checkmarx
    • Invicti
    • Bright
    • Riskified
    • MazeBolt
    • Mend
  • Services
    • Center of Excellence in Cybersecurity for Resellers and Technical Teams
    • Cybersecurity Consulting with a Focus on AppSec
    • Services – Value-Added Cybersecurity Distributor
  • Cases
  • Contact us
  • About Us
  • Portfolio
    • CORO
    • Upwind
    • Cequence
    • CORO
    • IRONSCALES
    • Checkmarx
    • Invicti
    • Bright
    • Riskified
    • MazeBolt
    • Mend
  • Services
    • Center of Excellence in Cybersecurity for Resellers and Technical Teams
    • Cybersecurity Consulting with a Focus on AppSec
    • Services – Value-Added Cybersecurity Distributor
  • Cases
  • Contact us
  • +55 (11) 3375 0133
  • contato@nova8.com.br
Linkedin-in Facebook-square Instagram Youtube
Saiba mais
Search

SOLUÇÕES NOVA8

  • Checkmarx
  • Acunetix
  • Bright
  • Whitesource
  • Riskified
  • MazeBolt
  • Ironscales
  • +55 (11) 3375 0133
  • contato@nova8.com.br
Linkedin-in Facebook-square Instagram Youtube