People are becoming increasingly concerned about their security. They use two-step authentication, login alerts, and third-party security services to better protect their email and social media accounts. One would hope for a similar -- if not more secure -- level of protection from our banks. After all, this is the place where we put most of our earnings and savings. However, apparently we are all mistaken. Mobile security firm Appvigil is reporting that as many as 70 percent of the top 100 mobile banking apps on the Android operating system in the APAC region are vulnerable to security attacks and data leaks. Don’t live in the said region? That’s no reason to relax. The report further pinpoints vulnerabilities in mobile banking apps found in other regions as well.

The security firm tested the mobile banking apps of the top 29 Indian banks and 71 more in the Asia Pacific region and the results are staggeringly bad. "Most of the mobile banking apps failed and many didn’t employ even the basic security checks expected. The communication between the apps & their servers is still in the unencrypted format i.e. in HTTP instead of HTTPS", the report reveals.

In the past couple of years as security threats reached new heights, most of the banks in European and American regions implemented security measures such as authentication using e-tokens, one-time passwords (OTP), and confirmation of transactions through codes sent to Android phones, but as Appvigil points out -- which is in line with news reports we have seen previously -- cybercriminals have developed tools that bypass these measures.

"There are numerous ways by which security loopholes can arise in an Android application. Organizations today, are focusing more on state of the art features, responsive and performance optimization issues without paying much heed to security. In most of the cases people react to security issues only when they face some discrepancies via a malicious threat agent", the report adds.

Furthermore, the report chalks out loopholes -- such as issues of system clock accuracy, and time synchronization -- arising due to ignorance by our carriers and network admins. "If certain processes run out of sequence, such as transaction processing and backups, then the results of these processes may cause discrepancies, due to the transaction times failing to tally. Mismatched timestamps often cause financial and database program errors".

The firm found a staggering 983 security vulnerabilities in the 100 mobile banking apps it tested. These vulnerabilities include exploits such as intent spoofing, unintended data leakage, SQL injection, JavaScript injection, XML injection, and unencrypted sockets among others. "The findings of our analysis presented in this report have a different story to tell. It's evident from the report that most of the apps are vulnerable to security attacks with 82 percent of apps carrying high severity vulnerabilities in them. On an average, 14 security bugs per app are present. Surprisingly, we found five mobile banking apps which had more than 50 security vulnerabilities in each of them". You can read more about it here.

You should be concerned about this even if you don’t live in the APAC region. Gizmodo did a comprehensive rundown of existing security measures utilized by all major banks in the United States and other regions, and the results were woeful. We contacted AVG, a popular mobile security firm to see what they think about this report. "There are banking apps in many markets which can be vulnerable to compromise but we are aware that banks do prioritize working on a fix obviously", Yuval Ben-Itzhak, CTO at AVG tells BetaNews.

"An example of one of these vulnerabilities is where an app downloads data and caches it on the device in multiple places. Some of these files may be able to be accessed by other apps and may not be removed after the banking app has used them. An uninstaller app would help ensure such data is removed for security purposes. Another example would be where an app is using a vulnerable WebView component, such as on a version of Android that is earlier than 4.1, which may leave it open to risk.", he added.