Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Soaring high: QKS SPARK Matrix YoY comparison of the SOAR market 2024-2025

    July 8, 2025

    Denying DDoS attacks from your systems

    July 7, 2025

    QKS SPARK Matrix YoY comparison of Connected Medical Devices Security (CMDS) market 2023-2024

    July 2, 2025
    LinkedIn
    Infosec TechBuzz Tuesday, July 8
    LinkedIn
    Get In Touch
    • About Us
    • Blog
    • Domains
      • Monitoring, Response & Threat Intelligence
      • Application, Data & Identity Protection
      • Infrastructure & Endpoint Security
      • Governance, Risk & Human-Centric Security
    Infosec TechBuzz
    Home » In-App Protection: App-solutely Secure?
    Blogs

    In-App Protection: App-solutely Secure?

    Infosec TechBuzzBy Infosec TechBuzzJune 27, 2025
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Why Ignoring App Security May Cost You More Than You Realize 

    Still not convinced app security isn’t a big deal? Let’s examine some more real-life cyber disasters that prove just how disastrous it can be without In-App Protection. From billion-dollar businesses to everyday consumers, nobody is safe when security is compromised. These two high-profile incidents- the Uber data breach and the Starbucks app hack highlights the utmost importance of robust app data protection and application security best practices.   

    The $100,000 Cover-Up Scandal: Uber Hack

    Uber, in the year 2016, experienced a massive data breach  that revealed the personal data of 57 million riders and drivers worldwide. The stolen data included names, email addresses, phone numbers, and details of driver’s license. 

    How Cybercriminals Breached Uber’s Security? 

    The attackers got access through Uber’s GitHub account, a cloud-based platform where developers save their code. The attackers then found the details of  Uber’s private login credentials in GitHub and used these to access Uber’s Amazon Web Services (AWS) cloud storage, where sensitive rider and driver data were stored. They pulled out and stole millions of user records 

    The Cover-up Which Made Things Worse 

    Rather than reporting the hack to the concerned authorities, Uber took a controversial path. They paid the hackers $100,000 via its bug bounty program, which rewards ethical hackers for discovering security flaws. But this agreement came with a disturbing condition, the hackers had to agree to delete the stolen data. Uber hid the breach for more than a year, which not only violated protection laws but also demonstrated a lack of corporate accountability. 

    The Fallout: A Needed Lesson in App Data Protection 

    When the breach did become public in 2017, it resulted in severe legal consequences, including:  

    • Fines of $148 million from U.S. regulators.  
    • Global legal proceedings for not disclosing the breach 
    • Damage of reputation, forcing Uber to rebuild consumer trust 

    This incident demonstrates the importance for companies to prioriotize on transparency and strong security best practices, as neglecting these issues can result in significant problems. 

    The Starbucks App Hack: A Cash Drain for Users 

    In 2015 and 2017, Starbucks mobile payment application, which was used by millions of customers in the U.S, became victim to a series of cyberattacks resulting in financial losses for consumers. In contrast to the usual data breaches, this attack relied on a tactic called credential stuffing. How Hackers Took Advantage of Starbucks’ Weak Security:

    1. Hackers accessed leaked username-password combinations from earlier unrelated data breaches 
    2. They used automated bots to systematically test these credentials on Starbucks accounts.  
    3. If a user had reused their password, the hacker gained access 
    4. Once inside, hackers used the Starbucks apps’ “auto-reload” feature to drain money from linked credit card and bank accounts.  

    Why The Attacks Were So Dangerous 

    • No two-factor authentication (2FA): A significant flaw that allowed hackers to bypass login security effortlessly.  
    • Auto-Reload Feature: Once hackers steal money, the app automatically pulls more funds from the user’s bank 
    • Weak password practices: Many users reused passwords, making them easy targets.  

    The Backlash Against Starbucks 

    Starbucks received major criticism for its weak response to security. Rather than acknowledging its weak security practices, the company blamed users for bad password management. Critics say that Starbucks should have mandated Two-Factor Authentication (2FA), implemented login alerts for suspicious activities, and educated users on password security best practices. Blaming users is not an option, strong In-App Protection is. Companies must take responsibility for securing their apps. 

    How To Become a Smart App User: Stay Safe While Enjoying Your App 

    Although developers must create secure apps, you too have a role to play in securing your data. Follow these application security best practices to stay away from  cyber threats:  

    • Download apps only from reputed sources: Stick to the Google Play Store and Apple App Store but still, remain cautious.   
    • Check app permissions: Does a flashlight app need access to your contacts and location? Probably not!  
    • Use strong, unique passwords: Avoid easy-to-guess ones like “password123” or your pet’s name. Hackers love easy guesses.   
    • Enable Two-Factor Authentication (2FA): It adds an extra layer of security to prevent unauthorized logins.   
    • Update your apps regularly: developers release Security patches to fix vulnerabilities. Don’t ignore them.  
    • Stay away from public Wi-Fi for sensitive transactions: Running banking apps over public Wi-Fi is like yelling your credit card number in a public place. Just don’t do it!    
    • Check app permissions before downloading: Avoid apps that request for unnecessary access to sensitive information like SMS, contacts, or accessibility services.   

    Secure your apps like you secure your bank accounts 

    Your phone is a gold mine of personal data, and hackers are always looking for new methods to take advantage of it. In-app protection is not optional. It’s a necessity. The Uber and Starbucks hacks demonstrates that even reputed companies make security errors, and customers too end paying the price. By following proper application security best practices, you can effectively reduce your risk. So, the next time you install an app, ask yourself:  Is this app as safe as it is handy? If not, think twice before hitting that install button. Stay smart, stay secure, and keep hackers out of your data! 

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Avatar
    Infosec TechBuzz
    • Website

    Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

    Related Posts

    Soaring high: QKS SPARK Matrix YoY comparison of the SOAR market 2024-2025

    July 8, 2025

    Denying DDoS attacks from your systems

    July 7, 2025

    QKS SPARK Matrix YoY comparison of Connected Medical Devices Security (CMDS) market 2023-2024

    July 2, 2025
    Leave A Reply Cancel Reply

    Demo
    Top Posts

    Soaring high: QKS SPARK Matrix YoY comparison of the SOAR market 2024-2025

    July 8, 2025

    QKS SPARK Matrix YoY analysis for the insider risk management market 2023-2024

    June 18, 2025

    QKS SPARK Matrix YoY analysis for the insider risk management market 2024-2025

    June 18, 2025

    QKS SPARK Matrix YoY Analysis for Digital Forensics and Incident Response (DFIR) Services Market 2023-2024

    June 18, 2025
    Don't Miss
    Blogs

    Soaring high: QKS SPARK Matrix YoY comparison of the SOAR market 2024-2025

    By NikhilJuly 8, 20250

    Most of us will have spotted the pun in the heading from a mile away,…

    Denying DDoS attacks from your systems

    July 7, 2025

    QKS SPARK Matrix YoY comparison of Connected Medical Devices Security (CMDS) market 2023-2024

    July 2, 2025

    How to dam data breaches?

    July 1, 2025
    Stay In Touch
    • LinkedIn

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    About Us
    About Us

    The buzz stops here

    A no-frills resource for professionals who want facts, not fluff. We cut through the noise to bring you what matters in cybersecurity, risk management, and compliance — straight to the point.

    LinkedIn
    Quick Links
    • Home
    • About Us
    • Blog
    Most Popular

    QKS SPARK Matrix YoY analysis for the DDoS mitigation market 2023-2024

    QKS SPARK Matrix YoY analysis for the insider risk management market 2023-2024

    QKS SPARK Matrix YoY analysis for the insider risk management market 2024-2025

    • Home
    • About Us
    • Blog
    © 2025 Designed by TechBuzz.Media | All Right Reserved.

    Type above and press Enter to search. Press Esc to cancel.