Metaforic identifies Android app threat100% of Android applications compromised, according to Metaforic

All of the most popular mobile applications for the Android platform may have been hacked, according to Infosecurity, an online resource for security information. This possibility is being echoed by Metaforic, a leading mobile security provider, which suggests that the likelihood of a person downloading a compromised application has risen exponentially over the past few years. Metaforic notes that as more compromised applications become available, they could create a serious security threat against major enterprises and even government agencies.

Lack of standards and wide variety of development practices seed potential threats

Application development has changed over the years and developers have adopted myriad practices in order to conduct their tasks. Because there are so many ways to create a mobile application, there is limited standardization that exists to protect the integrity of these applications and ensure they live up to a certain expectation. Metaforic notes that most, if not all, applications becoming compromised because of app repackaging. Repackaging refers to programs that are part of applications that automatically install software across a wide variety of platforms.

Few consumers take steps to protect their mobile devices

Another issue that is causing significant problems in the mobile security sector is the fact that very few people actually protect their smart phones and mobile devices. The vast majority of consumers do not have any kind of security software installed on their devices, leaving them at risk of having their device infected by malware or exploited in other ways. While most mobile devices have some form of internal security, third party software is often needed to completely ensure the security of a smart phone or tablet.

Metaforic advises consumers to find ways to protect themselves

Many of the compromised applications available for the Android platform are likely dormant in some fashion. That is to say that the threats associated with these applications have not yet been activated. Indeed, these threats may never actually take form, but given the fact that so many applications have been compromised — in many cases long before they have actually reached the app market — it may be prudent for consumers to find new ways to protect themselves.