{"id":2109,"date":"2015-12-01T09:48:16","date_gmt":"2015-12-01T09:48:16","guid":{"rendered":"https:\/\/yeeply.com\/en\/blog\/?p=2109"},"modified":"2020-12-01T12:32:11","modified_gmt":"2020-12-01T12:32:11","slug":"6-security-risks-android-mobile-application-development","status":"publish","type":"post","link":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/","title":{"rendered":"6 security risks in Android mobile application development"},"content":{"rendered":"<p style=\"text-align: justify;\">Among other things, 2015 has taught us that Android vulnerabilities still exist. When <a href=\"https:\/\/yeeply.com\/en\/blog\/roi-in-mobile-application-development\/\">it comes to mobile application development<\/a>, protecting the privacy of users is becoming increasingly important due to the many persisting security threats.<\/p>\n<p style=\"text-align: justify;\">The aim of this article is to gather together and present the <strong>security risks that we may have to confront in Android mobile application development<\/strong>. In fact, it&#8217;s one of the most targeted and vulnerable operating systems.<\/p>\n<p style=\"text-align: justify;\">Android is precisely the most widely used operating system in the world (at least 80% of mobile devices run on it). This makes it the main target for hackers and cyber-attacks.<\/p>\n<div style=\"text-align: center;\">\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<div class=\"bt-proyecto\"><a class=\"do-not-track\" href=\"https:\/\/yeeply.com\/en\/mobile-app-development\/?rel=EN-BT-proyecto-app#publish-project\" target=\"_blank\" rel=\"noopener\">WANT TO CREATE AN APP? TELL US ABOUT YOUR PROJECT!<\/a><\/div>\n<h2 style=\"text-align: justify;\"><strong style=\"line-height: 1.5;\">1. Malware or malicious software<\/strong><\/h2>\n<p style=\"text-align: justify;\">According to the mobile security company <strong><em>Zimperium<\/em><\/strong>, 95% of Android devices are vulnerable to this kind of attack. Translated into absolute numbers this means that 900,000 devices are at risk of being hacked without their owners being aware of it.<\/p>\n<p style=\"text-align: justify;\">The main access channel for these malware programmes is downloading apps outside the Google store, although this is far from being the only way they spread. There are currently just over 75,000 identified threats of this nature.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2113 size-full\" title=\"security risks banner yeeply\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/11\/mobile-app-development-Android-Yeeply-1.jpg\" alt=\"security risks banner yeeply\" width=\"543\" height=\"255\" srcset=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/11\/mobile-app-development-Android-Yeeply-1.jpg 543w, https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/11\/mobile-app-development-Android-Yeeply-1-300x141.jpg 300w\" sizes=\"(max-width: 543px) 100vw, 543px\" \/><\/p>\n<p style=\"text-align: justify;\">The range of malware programmes is growing on a daily basis. 79% of the time, viruses result in a higher phone bill, i.e. they increase our consumption by sending messages, spending data or making phone calls without our approval. The most common in Android according to Spanish leading telecommunications company&#8217;s blog <strong><a href=\"http:\/\/comunidad.movistar.es\/t5\/Blog-Android\/Tipos-de-malware-m%C3%A1s-frecuentes-en-Android\/ba-p\/670323\">Movisfera<\/a><\/strong> are:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Andr\/PJApps-C:\u00a0<\/strong>these are apps that have been modified using a tool available on the Internet. They are not necessarily malicious but are likely to entail some kind of illegal activity.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>Andr\/BBridge-A:\u00a0<\/strong>this kind may install additional malicious apps on Android devices. It can scan a device&#8217;s SMS and delete those warning about paid-for content.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>Andr\/Generic-S:\u00a0<\/strong>these are malicious apps that range from those that involve privilege escalation exploits to aggressive adware programmes.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>Andr\/BatterD-A:\u00a0<\/strong>these apps are covertly embedded <a href=\"https:\/\/yeeply.com\/en\/blog\/screen-colours-and-typography-basic-elements-in-apps-design\/\">within apps that appear to be designed<\/a> to save battery but whose real aim is sending personally identifiable information to a server and displaying ads on the phone.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>Andr\/DrSheep-A:\u00a0<\/strong>this malware allows hackers to hijack Facebook, Twitter or LinkedIn sessions on a wireless network environment.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><strong>2. Android fragmentation<\/strong><\/h2>\n<p style=\"text-align: justify;\">By Android fragmentation, we mean the fact that <strong>not all mobile devices running on Google&#8217;s operating system use the same version of it<\/strong>. Some will have never had their OS updated, while others will be running on the most up-to-date version. Not to mention those devices that will not support new versions due to a lack of memory space.<\/p>\n<p style=\"text-align: justify;\">The thing is that devices that are not updated remain vulnerable due to former OS programming errors because they will not have the latest security updates. According to the distribution of Android versions in early August 2015, it is as follows:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Lollipop\u00a0<\/strong>5.0 y 5.1: 18.1% of devices<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>KitKat\u00a0<\/strong>4.4: 39.3% of devices<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><strong>JellyBean <\/strong>(versions 4.1 to 4.3): 33.6% of devices<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Other <strong>previous versions<\/strong>: 9% of devices<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><strong><img decoding=\"async\" class=\"aligncenter wp-image-2114 size-full\" title=\"android fragmentation graphic\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/11\/mobile-app-development-Android.png\" alt=\"android fragmentation graphic\" width=\"497\" height=\"239\" \/><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><strong>Source:<\/strong>\u00a0<a class=\"ext-link\" title=\"\" href=\"http:\/\/www.cnet.com\/es\/noticias\/fragmentacion-android-2015\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CNet<\/a>\u00a0<\/strong><\/p>\n<h2 style=\"text-align: justify;\"><strong>3. Customised operating systems<\/strong><\/h2>\n<p style=\"text-align: justify;\">Another major risk faced by Android devices which may lead to a security breach is due to <strong>the possibility of customising the operating system<\/strong>. This risk is faced by both phone manufacturers and mobile users.<\/p>\n<p style=\"text-align: justify;\">For example, sometimes device manufacturers (such as Samsung, HTC or Huawei) modify the operating system to include their brand on Android&#8217;s OS.<\/p>\n<p style=\"text-align: justify;\">On the other hand, users may also modify the operating system by incorporating customisation layers or through the so-called launchers. In these cases, Android&#8217;s OS is modified leading to security gaps as it doesn&#8217;t envisage the consequences brought about by these changes.<\/p>\n<p style=\"text-align: justify;\">An example of this may be <em>phishing<\/em> programmes that change the icon settings on the device&#8217;s main screen. In this case, these shortcuts change their appearance and no longer redirect to the proper applications.<\/p>\n<div style=\"text-align: center;\">\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<p><a href=\"https:\/\/yeeply.com\/en\/landing\/download-ebook-apps\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2020\/04\/CTA_YEEPLY_Guia_APP_EN.jpg\" alt=\"Ebook 1 App Descarga\" \/><\/a><\/p>\n<h2 style=\"text-align: justify;\"><strong>4. App downloads outside the store<\/strong><\/h2>\n<p style=\"text-align: justify;\">We were already pointing this problem out in this article&#8217;s first section on malware. Now we would like to focus on <strong>downloading apps from sites other than the official store<\/strong>. Android mobile application development is simple and any developer can create a malicious application. <strong>Be careful!<\/strong><\/p>\n<p style=\"text-align: justify;\">Now and then users choose to download apps from unofficial sites to avoid payment. This can result in downloading a fake app or one that has been modified to install a virus on your mobile device.<\/p>\n<h2 style=\"text-align: justify;\"><strong>5. Infiltration of malicious apps in the store<\/strong><\/h2>\n<p style=\"text-align: justify;\">Publishing an Android app on Google Play is relatively simple. Besides, <a href=\"https:\/\/yeeply.com\/en\/blog\/how-to-create-apps-with-no-programming-knowledge\/\">Android mobile application development is spreading like wildfire<\/a>: hundreds of developers upload apps to the store every single day. And \u2212 although Google does its best to try to keep its store free from malware \u2212 <strong>it&#8217;s possible that viruses may be sneaking in.<\/strong><\/p>\n<p style=\"text-align: justify;\">This is precisely the reason behind Google cleaning its store from time to time: to eliminate malware or malicious applications. The aim is to remove those apps that may pose a threat to the user&#8217;s privacy and the mobile device&#8217;s security.<\/p>\n<p style=\"text-align: justify;\">Google removes any published applications from the store that have been identified as containing malware. However, unfortunately, it&#8217;s always feasible that they have already been downloaded to a certain extent.<\/p>\n<p style=\"text-align: justify;\">If the malicious app has been massively downloaded and many users have been affected, the solution consists in removing the infectious applications remotely. This solution is known as the kill switch.<\/p>\n<h2 style=\"text-align: left;\"><strong>6. Vulnerable software for mobile application development<\/strong><\/h2>\n<p style=\"text-align: justify;\">Android&#8217;s weaknesses can be found in many places: in the operating system itself, in the apps included by default on the device, in those we download in tools coming from sources other than the platform&#8230; A striking case was <strong><em>Heartbleed<\/em><\/strong>, a breach in <strong>OpenSSL<\/strong> that posed a global security breach.<\/p>\n<p style=\"text-align: justify;\"><strong>To sum it up<\/strong>, no software is completely flawless. Not even Google itself has managed to create an operating system free of security breaches. The good news is that most security breaches can be avoided if we develop apps for Android correctly and our users apply their common sense <a href=\"https:\/\/yeeply.com\/en\/blog\/mobile-marketing-dowloads-vs-engagement\/\">when downloading apps and granting permissions to mobile applications<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<p><a href=\"https:\/\/yeeply.com\/en\/mobile-app-development\/?rel=EN-BP-proyecto-app#publish-project\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2020\/04\/EN_proyecto-app_blog-post_B.png\" alt=\"Proyecto App\" width=\"620\" height=\"253\" \/><\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Among other things, 2015 has taught us that Android vulnerabilities still exist. When it comes to mobile application development, protecting the privacy of users is &#8230;<\/p>\n","protected":false},"author":2,"featured_media":4478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[24],"tags":[],"class_list":["post-2109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-app-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Security risks in mobile app development for Android<\/title>\n<meta name=\"description\" content=\"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Security risks in mobile app development for Android\" \/>\n<meta property=\"og:description\" content=\"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/\" \/>\n<meta property=\"og:site_name\" content=\"Yeeply\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YeeplyMobile\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-01T09:48:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-01T12:32:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"5472\" \/>\n\t<meta property=\"og:image:height\" content=\"3648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yeeply\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:site\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yeeply\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/\"},\"author\":{\"name\":\"Yeeply\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\"},\"headline\":\"6 security risks in Android mobile application development\",\"datePublished\":\"2015-12-01T09:48:16+00:00\",\"dateModified\":\"2020-12-01T12:32:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/\"},\"wordCount\":1010,\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/pexels-photo-50614-compressor-1.jpeg\",\"articleSection\":[\"App\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/\",\"name\":\"6 Security risks in mobile app development for Android\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/pexels-photo-50614-compressor-1.jpeg\",\"datePublished\":\"2015-12-01T09:48:16+00:00\",\"dateModified\":\"2020-12-01T12:32:11+00:00\",\"description\":\"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#primaryimage\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/pexels-photo-50614-compressor-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/pexels-photo-50614-compressor-1.jpeg\",\"width\":5472,\"height\":3648,\"caption\":\"mobile application development\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/mobile-app-development\\\/6-security-risks-android-mobile-application-development\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 security risks in Android mobile application development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\",\"name\":\"Yeeply\",\"description\":\"A platform for the development of digital projects\",\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yeeply.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\",\"name\":\"Yeeply\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"width\":360,\"height\":120,\"caption\":\"Yeeply\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YeeplyMobile\\\/\",\"https:\\\/\\\/x.com\\\/Yeeply_EN\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/yeeply\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\",\"name\":\"Yeeply\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"caption\":\"Yeeply\"},\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/author\\\/yeeply\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Security risks in mobile app development for Android","description":"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/","og_locale":"en_US","og_type":"article","og_title":"6 Security risks in mobile app development for Android","og_description":"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f","og_url":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/","og_site_name":"Yeeply","article_publisher":"https:\/\/www.facebook.com\/YeeplyMobile\/","article_published_time":"2015-12-01T09:48:16+00:00","article_modified_time":"2020-12-01T12:32:11+00:00","og_image":[{"width":5472,"height":3648,"url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg","type":"image\/jpeg"}],"author":"Yeeply","twitter_card":"summary_large_image","twitter_creator":"@Yeeply_EN","twitter_site":"@Yeeply_EN","twitter_misc":{"Written by":"Yeeply","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#article","isPartOf":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/"},"author":{"name":"Yeeply","@id":"https:\/\/yeeply.com\/en\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14"},"headline":"6 security risks in Android mobile application development","datePublished":"2015-12-01T09:48:16+00:00","dateModified":"2020-12-01T12:32:11+00:00","mainEntityOfPage":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/"},"wordCount":1010,"publisher":{"@id":"https:\/\/yeeply.com\/en\/#organization"},"image":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg","articleSection":["App"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/","url":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/","name":"6 Security risks in mobile app development for Android","isPartOf":{"@id":"https:\/\/yeeply.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#primaryimage"},"image":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg","datePublished":"2015-12-01T09:48:16+00:00","dateModified":"2020-12-01T12:32:11+00:00","description":"In this article we present the top 6 security risks we can find when we work on mobile application development for Android apps and devices. \u261d\ufe0f","breadcrumb":{"@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#primaryimage","url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg","contentUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg","width":5472,"height":3648,"caption":"mobile application development"},{"@type":"BreadcrumbList","@id":"https:\/\/yeeply.com\/en\/blog\/mobile-app-development\/6-security-risks-android-mobile-application-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yeeply.com\/en\/"},{"@type":"ListItem","position":2,"name":"6 security risks in Android mobile application development"}]},{"@type":"WebSite","@id":"https:\/\/yeeply.com\/en\/#website","url":"https:\/\/yeeply.com\/en\/","name":"Yeeply","description":"A platform for the development of digital projects","publisher":{"@id":"https:\/\/yeeply.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yeeply.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yeeply.com\/en\/#organization","name":"Yeeply","url":"https:\/\/yeeply.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yeeply.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","contentUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","width":360,"height":120,"caption":"Yeeply"},"image":{"@id":"https:\/\/yeeply.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YeeplyMobile\/","https:\/\/x.com\/Yeeply_EN","https:\/\/www.linkedin.com\/company\/yeeply"]},{"@type":"Person","@id":"https:\/\/yeeply.com\/en\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14","name":"Yeeply","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","caption":"Yeeply"},"url":"https:\/\/yeeply.com\/en\/author\/yeeply\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",5472,3648,false],"thumbnail":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1-150x150.jpeg",150,150,true],"medium":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1-300x200.jpeg",300,200,true],"medium_large":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1-768x512.jpeg",640,427,true],"large":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1-1024x683.jpeg",640,427,true],"1536x1536":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",1536,1024,false],"2048x2048":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",2048,1365,false],"gform-image-choice-sm":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",300,200,false],"gform-image-choice-md":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",400,267,false],"gform-image-choice-lg":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2015\/12\/pexels-photo-50614-compressor-1.jpeg",600,400,false]},"uagb_author_info":{"display_name":"Yeeply","author_link":"https:\/\/yeeply.com\/en\/author\/yeeply\/"},"uagb_comment_info":0,"uagb_excerpt":"Among other things, 2015 has taught us that Android vulnerabilities still exist. When it comes to mobile application development, protecting the privacy of users is ...","_links":{"self":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts\/2109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/comments?post=2109"}],"version-history":[{"count":0,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts\/2109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/media\/4478"}],"wp:attachment":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/media?parent=2109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/categories?post=2109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/tags?post=2109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}