Several companies have moved quickly to add encryption to their mobile apps after it was discovered they failed to encrypt payment card information in transit, putting users at risk.
The apps were not using SSL/TLS (Secure Sockets Layer/Transport Layer Security), an encryption protocol that scrambles data as it's sent across the Internet, according to Wandera, a cloud and mobile security vendor.
"With so many breaches and costly data loss incidents in the news, it's hard to believe that any business would fail to take such a basic precaution as to encrypt sensitive traffic as it's transmitted to or from a website," said Michael J. Covington, senior product manager, in a video posted Wednesday.
Data breaches can be costly for companies, and how to better protect payment card information has been a big question after major breaches at retailers including Target, Home Depot and many others.
Five of the 16 companies named by Wandera in a blog post have now fixed their problems, including easyJet, Chiltern Railways, San Diego Zoo, CN Tower, and Aer Lingus, a Wandera spokeswoman said Wednesday. All of the companies were notified of the issue by Wandera, which estimates they collectively serve 500,000 customers a day.
The company detected the problems while analyzing traffic flows of customers that use its mobile security app and gateway technology.
Using SSL/TLS when transmitting information such as login credentials, personal information and payment card data is considered standard practice to guard against breaches. Encrypted connections are typically signified in the browser URL bar by a padlock icon and "https."
If the data is not encrypted, someone on the same network -- such as a public Wi-Fi hotspot -- could collect the traffic and see the information in plain text.
Covington said in some cases the primary websites did use encryption, but the same services were not protected when using mobile browsers or apps.
Mobile apps often have multiple connections to backend services, and all need to be treated with the same protection, Covington said.
In January, Wandera found that the National Football League's mobile app leaked usernames and passwords due to an unencrypted API (application programming interface) call, according to an advisory. The problem was later fixed.