Some of the most common security gaffs nestled inside of those decompiled and inspected Android apps according to Godfrey Nolan, founder of RIIS and author of both Decompiling Java and Decompiling Android?
- Without using obfuscating tools like HoseDex2Jar, people can easily reverse engineer the code in most Android applications.
- Sensitive data is being stored unencrypted on devices.
- Code that communicates with back-end systems often includes plain text security credentials. That means your security problem is no longer people getting those embarrassing and X-rated images you’ve taken of your ‘front end’, but instead, they now have access to your entire ‘back end’ as well.