Companies scramble to fix lack of encryption on mobile apps
11 December 2015 | 0
Several companies have moved quickly to add encryption to their mobile apps after it was discovered they failed to encrypt payment card information in transit, putting users at risk.
The apps were not using Secure Sockets Layer/Transport Layer Security (SSL/TLS), an encryption protocol that scrambles data as it’s sent across the Internet, according to Wandera, a cloud and mobile security vendor.
“With so many breaches and costly data loss incidents in the news, it’s hard to believe that any business would fail to take such a basic precaution as to encrypt sensitive traffic as it’s transmitted to or from a web site,” said Michael J Covington, senior product manager, in a video.
Data breaches can be costly for companies, and how to better protect payment card information has been a big question after major breaches at retailers including Target, Home Depot and many others.
Five of the 16 companies named by Wandera in a blog post have now fixed their problems, including easyJet, Chiltern Railways, San Diego Zoo, CN Tower and Aer Lingus, a Wandera spokeswoman said. All of the companies were notified of the issue by Wandera, which estimates they collectively serve 500,000 customers a day.
The company detected the problems while analysing traffic flows of customers that use its mobile security app and gateway technology.
Using SSL/TLS when transmitting information such as login credentials, personal information and payment card data is considered standard practice to guard against breaches. Encrypted connections are typically signified in the browser URL bar by a padlock icon and “https.”
If the data is not encrypted, someone on the same network — such as a public Wi-Fi hotspot — could collect the traffic and see the information in plain text.
Covington said in some cases the primary web sites did use encryption, but the same services were not protected when using mobile browsers or apps.
Mobile apps often have multiple connections to backend services, and all need to be treated with the same protection, Covington said.
In January, Wandera found that the US National Football League’s mobile app leaked usernames and passwords due to an unencrypted application programming interface (API) call, according to an advisory. The problem was later fixed.
Jeremy Kirk, IDG News Service