Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

WhiteHat Security Launches Mobile Application Assessment Solution

WhiteHat Security this week launched a new assessment tool to find vulnerabilities in mobile applications.

WhiteHat Security this week launched a new assessment tool to find vulnerabilities in mobile applications.

Businesses can test mobile applications with WhiteHat Sentinel Mobile application to assess, verify, and report code-level flaws, WhiteHat Security said Wednesday. Organizations can efficiently evaluate “all facets of in-house and third-party mobile applications” without having to stop and consider what hardware platform or operating system the mobile device is running, according to the company. WhiteHat Sentinel Mobile can scan scan iOS, Android and other mobile platforms right from launch.

WhiteHat Security Logo The majority of mobile application problems actually can be found in the server and go undetected for a period of time, creating even more attack surfaces to exploit, Jerry Hoff, vice-president of the source code analysis division at WhiteHat Security, said in a statement. WhiteHat is using its Sentinel technology to test applications on smartphones, tablets and server-side components to mitigate business risk, Hoff said.

“WhiteHat Sentinel Mobile includes the assessment of the source code of the mobile application and an assessment of the runtime interactions of the mobile application as it interacts with the remote server/site,” Hoff told SecurityWeek. “WhiteHat Sentinel Mobile is designed to assess the source code of the mobile application as well as the app’s runtime interaction as it communicates with the remote server or site,” Hoff explained.

The scanner evaluates both device and server-side code, performs static and dynamic scanning, and correlates the results. Sentinel Mobile not only looks at the source code, but how the app interacts with the remote serer, Hoff added.

“The success of mobile and tablets have demonstrated unequivocally that businesses and the public will be gradually migrating away from multi-purpose computers towards these types of devices,” Stephanie Fohn, CEO of WhiteHat Security said in a statement.

When it comes to scanning mobile applications, the OWASP Top 10 list of common programming mistakes for desktop systems, still apply. The list, in no particular leader, includes: Insecure Data Storage, Weak Server Side Controls, Insufficient Transport Layer Protection, Client Side Injection, poor Authentication/Authorization, improper session handling, and Side Channel Data leakage, security devices unable to use USB pens, and broken cryptography, Hoff said.

Users should also make sure the apps are tested for the following: Directory and File Structure Analysis, Configuration Analysis, Application permissions model, Encryption APIs and hardware-supported encryption capabilities, security of networking communications and data transmissions, and insufficient authorization.

“Mobile web application security assessment can also unearth relevant web application security techniques combined with assessment techniques specific to mobile platforms,” WhiteHat said.

Advertisement. Scroll to continue reading.

Organizations can view a unified dashboard, which lists information about mobile, native and Web application security posture among employees as well as across the industry.

Sentinel Mobile is available today as a stand-alone offering or as an addition to existing WhiteHat Sentinel deployments. “Mobile application security has seen too much confusion and fragmentation and not enough focus on where the heart of security problems truly lie,” Hoff said.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.