Mobile apps are often abandoned by their creators who sometimes move on to a bigger, better deal. The apps can still contact custom domain names for arbitrary tasks like configuration changes. Contact data, text messages, pictures, GPS data and call logs are all sitting at risk of an attack. Security practitioners should pay closer attention to mobile apps, says Joo Gouveia, CTO of Anubis Networks. Protecting against abandoned domain names is hard, but it’s a growing trend that should raise some concern.”]

