“Arbisoft is an integral part of our team and we probably wouldn't be here today without them. Some of their team has worked with us for 5-8 years and we've built a trusted business relationship. We share successes together.”
“They delivered a high-quality product and their customer service was excellent. We’ve had other teams approach us, asking to use it for their own projects”.
“Arbisoft has been a valued partner to edX since 2013. We work with their engineers day in and day out to advance the Open edX platform and support our learners across the world.”
81.8% NPS78% of our clients believe that Arbisoft is better than most other providers they have worked with.
Arbisoft is your one-stop shop when it comes to your eLearning needs. Our Ed-tech services are designed to improve the learning experience and simplify educational operations.
“Arbisoft has been a valued partner to edX since 2013. We work with their engineers day in and day out to advance the Open edX platform and support our learners across the world.”
Get cutting-edge travel tech solutions that cater to your users’ every need. We have been employing the latest technology to build custom travel solutions for our clients since 2007.
“Arbisoft has been my most trusted technology partner for now over 15 years. Arbisoft has very unique methods of recruiting and training, and the results demonstrate that. They have great teams, great positive attitudes and great communication.”
As a long-time contributor to the healthcare industry, we have been at the forefront of developing custom healthcare technology solutions that have benefitted millions.
I wanted to tell you how much I appreciate the work you and your team have been doing of all the overseas teams I've worked with, yours is the most communicative, most responsive and most talented.
We take pride in meeting the most complex needs of our clients and developing stellar fintech solutions that deliver the greatest value in every aspect.
“Arbisoft is an integral part of our team and we probably wouldn't be here today without them. Some of their team has worked with us for 5-8 years and we've built a trusted business relationship. We share successes together.”
Unlock innovative solutions for your e-commerce business with Arbisoft’s seasoned workforce. Reach out to us with your needs and let’s get to work!
The development team at Arbisoft is very skilled and proactive. They communicate well, raise concerns when they think a development approach wont work and go out of their way to ensure client needs are met.
Arbisoft is a holistic technology partner, adept at tailoring solutions that cater to business needs across industries. Partner with us to go from conception to completion!
“The app has generated significant revenue and received industry awards, which is attributed to Arbisoft’s work. Team members are proactive, collaborative, and responsive”.
“Arbisoft partnered with Travelliance (TVA) to develop Accounting, Reporting, & Operations solutions. We helped cut downtime to zero, providing 24/7 support, and making sure their database of 7 million users functions smoothly.”
“I couldn’t be more pleased with the Arbisoft team. Their engineering product is top-notch, as is their client relations and account management. From the beginning, they felt like members of our own team—true partners rather than vendors.”
Arbisoft was an invaluable partner in developing TripScanner, as they served as my outsourced website and software development team. Arbisoft did an incredible job, building TripScanner end-to-end, and completing the project on time and within budget at a fraction of the cost of a US-based developer.
In the previous part of this blog series, we discussed best practices for securing mobile applications, focusing on authentication and session management. Now, we shift our attention to another essential layer of mobile security, platform interaction requirements. These security measures ensure that mobile apps interact with platform APIs and system components securely, minimizing risks related to excessive permissions, unvalidated inputs, JavaScript execution, and overlay attacks.
Platform Interaction Requirements
The security measures in this group ensure that the app uses platform APIs and standard components securely.
The App Only Requests the Minimum Permissions Necessary
The mobile app should follow the principle of least privilege and request only the minimum permissions needed to function properly. This limits access to sensitive data and system resources. In case of a security breach, the potential impact is significantly reduced.
Scenario A mobile app requests multiple permissions, such as location, contacts, camera, storage, and gallery, but it only needs camera and storage permissions to function properly.
Attack If compromised, mobile apps with excessive permissions (camera, gallery, storage, location, contacts) can be exploited. Once granted, permissions can be misused to collect sensitive data or install malicious software. Also, prompting users to grant too many permissions can raise concerns.
Mitigation The app should request only essential permissions, such as camera and storage, for its core functionality. Users should be assured that their sensitive data, like location or contacts, is not accessed unnecessarily. The app should also comply with privacy laws and best practices for responsible data handling.
All Inputs from External Sources and Users Are Validated and Sanitized If Necessary
Inputs from external sources (clients) should be thoroughly validated and sanitized before being stored to prevent malicious data from compromising the app’s security. This includes any data received from the UI or through inter-process communication (IPC) mechanisms like intents, custom URLs, or network sources.
Scenario The app accepts user input for a search field and processes data from external sources, such as custom URLs or network APIs, without validation or sanitization.
Attack The mobile app has a user input field and data is stored without any validation. An attacker can enter a malicious query in search fields like DROP TABLE users, if this query is sent through a search field will cause SQL Injection attacks and will lead to database manipulation. Also, injected scripts in inputs can execute malicious actions when displayed on the UI.
Mitigation Inputs from external sources (clients) should be thoroughly validated and sanitized, By ensuring that inputs are clean and properly validated before processing, the app mitigates the risk of injection attacks, and cross-site scripting (XSS). In addition, other vulnerabilities could be exploited to harm the system or user data as well.
JavaScript Is Disabled in WebViews Unless Explicitly Required
If a mobile app uses embedded WebViews, JavaScript should be disabled unless required for specific functionality. Disabling JavaScript in WebViews reduces the attack surface by preventing harmful scripts from executing, which can lead to cross-site scripting (XSS) attacks. If JavaScript must be enabled for certain features, strict controls should be implemented to minimize risks.
Scenario A mobile app includes embedded WebViews to display content, but JavaScript is not disabled.
Attack Such mobile apps are vulnerable to cross-site scripting (XSS). Malicious JavaScript can be injected through untrusted websites, allowing attackers to steal cookies and session tokens. It can also perform malicious actions on behalf of the user. Malicious scripts may even create fake login forms, leading to phishing attacks.
Mitigation JavaScript should be disabled by default in WebViews. If enabling JavaScript is necessary, strict controls should be in place to monitor which scripts can run and what resources they can access.
The App Protects Itself Against Screen Overlay Attacks (Android Only)
Screen overlay attacks are common on Android devices, so apps should include protective measures. These attacks occur when a malicious app creates a transparent layer over the app’s UI, tricking the user into interacting with it.
Scenario An Android app does not implement any mechanism to protect against screen overlay attacks, such as clicking on buttons or providing sensitive information.
Attack A malicious app places a transparent layer over the UI, causing the user to interact with it unintentionally.
Mitigation To prevent screen overlay attacks, apps should monitor and restrict the use of screen overlay permissions. If overlay permissions are detected, the app should prompt the user to disable them for other apps. Sensitive UI elements should be designed to prevent overlays from interfering, using system-level checks or specific drawing flags.
Conclusion
Keeping mobile apps secure is important for protecting user data and privacy. Developers can improve security by asking for only the necessary permissions, checking and cleaning user inputs, turning off JavaScript in WebViews unless needed, and blocking screen overlay attacks. These steps help prevent hackers from misusing the app and make users feel safe. Since security risks keep changing, developers should regularly update their apps, test for weaknesses, and stay informed about new threats to keep their apps safe.