Skip to content
  • +55 (11) 3375 0133
  • contato@nova8.com.br
Linkedin-in Facebook-square Instagram Youtube
  • EN-US
  • PT-BR
  • ES-MX
Nova8
  • #Nova8is10!
  • Portfolio

    Checkmarx

    Application security testing solution

    Cequence

    API security platform

    Snyk

    Security for Developers

    IRONSCALES

    Application security testing for companies

    Upwind

    Cloud Security platform

    CORO

    Simplified Cybersecurity

    Invicti

    Web Security Tool for Vulnerability Detection

    See all solutions
  • Services

    VAD

    The only Value-Added Distributor (VAD) in Latin America mentioned in the Gartner Market Guide

    Center of Excellence Nova8 in Cybersecurity

    Accelerate your technical and strategic training with Nova8's innovation hub.

    Nova8 Consulting in Cybersecurity

    Strategy, efficiency and real protection for critical applications and data.

  • Cases
  • Blog & Materials
Contact us
Nova8
  • Home
  • Blog

Common Oversights in Mobile App Security

  • Nova8 Security Research Team
  • August 8, 2016
  • Audit

Aug 02, 2016 By Kevin Beaver

Mobile apps arguably have the greatest number of security flaws of any enterprise system – and no one seems to know much about them. Mobile app security flaws are numerous across all types of business apps. But why?

Perhaps it’s the mentality that “it’s just an app” or the reality that many business owners, especially those in smaller businesses who might not have advanced security, fall for the marketing hype of “we’ve got to have a mobile app,” without including security in the discussion. Mobile apps are as complex as ever, yet the security flaws are very predictable – and the bad guys know it.

Recent examples of the technical security flaws in mobile apps I’ve found include:

  • Unencrypted communication sessions
  • Weak passwords
  • Hard-coded passwords and cryptographic keys often for connecting to critical back-end systems
  • SQL injection
  • Sensitive information left behind, even after uninstalling

Vulnerabilities such as these can quickly create business risks, not to mention compliancegaps for PCI DSS, HIPAA and so on.

What does it take to find and eliminate these security flaws or, better yet, avoid them altogether?  These things are largely dependent on acknowledging the challenges in the first place. Mobile apps need to be part of your information risk management program which means that they need to be tested ideally during the SDLC or, worst-case, during ongoing security assessments or after any code or application environment changes are made. You need to look at your mobile apps from the perspectives of penetration testing, forensics, andsource code analysis because they’re all going to uncover different things.

Free Resources for Mobile App Security

I’m also a big proponent of using resources from outside parties – especially when they’re free. Good examples include the following:

  • OWASP Mobile Security Project
  • Cloud Security Alliance Mobile Working Group’s June 2016 whitepaper Mobile Application Security Testing Initiative
  • Mobile Health App Developers: FTC Best Practices
  • NIST Special Publication 800-163 Vetting the Security of Mobile Applications

Mobile apps not only present great business opportunities but also opportunities for ill-gotten gains. Even if they are seemingly benign marketing or field apps that process and store nothing of value, they can serve as an entry point or steppingstone into a bigger environment that can be used against you and your business. You wouldn’t let that happen with web applications – mobile apps should be no different.

Navigate by theme

  • Blog
  • Checkmarx
  • Cases
  • Nova8 Ecosystem
  • Cybersecurity Distribution
  • Market Strategy
  • value-added distributor
  • Cequence
  • Materials
  • Security management

Navigate by solution

  • Snyk
  • Upwind
  • Cequence
  • Coro
  • Ironscales
  • Checkmarx

Segurança começa pelo Colaborador

Stay Ahead of Cyber Threats

Explore our insightful materials such as e-books, whitepapers, articles, and blog content to learn all about cybersecurity trends.

See more
AI Experience o que o encontro da Nova8, Cequence e CISO’s Club mostrou sobre governança de IA e segurança de APIs
  • April 9, 2026
  • Cequence

AI Experience: what the meeting between Nova8 Cybersecurity, Cequence, and CISO’s Club revealed about AI governance and API security

The AI Experience demonstrated how AI already enables businesses but requires governance, guardrails, and API security. See the key insights from the event.
Read more
Nova8 RSA
  • March 30, 2026
  • value-added distributor

RSAC 2026: what really mattered at the world’s largest cybersecurity event

See the key insights from RSAC 2026, highlighting the role of AI, market positioning, and strategic learnings observed by Nova8 Cybersecurity.
Read more
Nova8_Cequence
  • March 16, 2026
  • Nova8 Ecosystem

AI Gateway, Agentic AI, and Corporate APIs: Why Cequence Has Become Strategic for Secure AI Adoption

Learn how Cequence's AI Gateway helps companies connect AI agents to APIs and applications with authentication, control, and monitoring.
Read more
Linkedin-in Facebook-square Instagram Youtube

Al. Rio Negro, 585 - Torre Jaçarí - 13º andar
Conjunto 134 - Alphaville, Barueri - SP, 06454-000

  • +55 (11) 3375 0133
  • contato@nova8.com.br

Company

  • #Nova8is10!
  • Events
  • VAD
  • Center of Excellence
  • Consulting
  • Work at Nova8
  • Privacy Policy
  • Code of Ethics

Portfolio

  • Checkmarx
  • Upwind
  • Cequence
  • CORO
  • Snyk
  • IRONSCALES
  • Invicti
  • Bright
  • Riskified
  • MazeBolt
  • Mend
  • Request a quote

Content

  • Clients and Cases

Copyright © Nova 8 Cybersecurity - 2025 - Todos os direitos reservados

Desenvolvido por Tech4Biz

Search
Nova8
  • EN-US
  • PT-BR
  • ES-MX
  • #Nova8is10!
  • Portfolio
    • CORO
    • Upwind
    • Cequence
    • CORO
    • IRONSCALES
    • Checkmarx
  • Services
    • Center of Excellence in Cybersecurity for Resellers and Technical Teams
    • Cybersecurity Consulting with a Focus on AppSec
    • Services – Value-Added Cybersecurity Distributor
  • Cases
  • Blog & Materials
  • Contact Us
  • #Nova8is10!
  • Portfolio
    • CORO
    • Upwind
    • Cequence
    • CORO
    • IRONSCALES
    • Checkmarx
  • Services
    • Center of Excellence in Cybersecurity for Resellers and Technical Teams
    • Cybersecurity Consulting with a Focus on AppSec
    • Services – Value-Added Cybersecurity Distributor
  • Cases
  • Blog & Materials
  • Contact Us
  • +55 (11) 3375 0133
  • contato@nova8.com.br
Linkedin-in Facebook-square Instagram Youtube
Search
Saiba mais
Search