report  Download / Print article PDF ##### ShareCopied to clipboard ##### Share##### Facebook##### Linkedin##### X##### Copy LinkCopied to clipboard ##### Share##### Facebook##### Linkedin##### X##### Copy LinkThreat report on application stores===================================This report outlines the risks associated with the use of official and third party app stores. Invalid DateTime  Over the last decade there has been an enormous increase in the availability and use of smartphones and smart devices. Many of these devices feature application stores (‘app stores’), which allow users to download additional applications and content. The vast majority of users, particularly on mobile platforms, download apps via these app stores.There’s also been increased demand for apps, primarily as a result of the COVID-19 pandemic as more people work, shop, and stay in touch online.Since there is a great variety of devices (and supporting app stores), there are a number of disparate and complex security issues that that can expose consumers and enterprises to online threats. This report summarises the risks associated with the use of official and third party app stores. It includes links to detailed guidance that describe how to mitigate the main threats.This report was compiled to inform [Department for Digital, Culture, Media -& Sport’s (DCMS) review on current threats associated with app stores](https://www.gov.uk/government/consultations/app-security-and-privacy-interventions). The report will aid in the development of policy interventions that will seek to improve app stores’ security and privacy controls to protect both UK consumers and enterprises.
[Read the report](/files/Threat-report-on-application-stores-web-v2.pdf) *** ** * ** ***Downloads———[* pdf* 2166 KB#### Threat report on application storesThis report outlines the risks associated with the use of official and third party app stores.](https://www.ncsc.gov.uk/files/Threat-report-on-application-stores-web-v2.pdf) Topics——[Cyber threat](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Cyber threat)[Devices](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Devices)[Vulnerabilities](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Vulnerabilities)|  | Back to top |  | Download / Print article PDF || ##### Share|| Copied to clipboard || ##### Share|| || ##### Facebook|| || ##### Linkedin|| || ##### X|| || ##### Copy Link|| Copied to clipboard || ##### Share|| || ##### Facebook|| || ##### Linkedin|| || ##### X|| || ##### Copy Link|| * || ##### Published|| * 4 May 2022| *|| ##### Written For|| * [Small -& medium sized organisations](/section/advice-guidance/small-medium-sized-organisations)| * [Large organisations](/section/advice-guidance/large-organisations)| * [Cyber security professionals](/section/advice-guidance/cyber-security-professionals)| * || ##### Published|| * 4 May 2022| *|| ##### Written For|| * [Small -& medium sized organisations](/section/advice-guidance/small-medium-sized-organisations)| * [Large organisations](/section/advice-guidance/large-organisations)* [Cyber security professionals](/section/advice-guidance/cyber-security-professionals)  Back to top
Related Tags:
NAICS: 55 – Management Of Companies And Enterprises
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 923 – Administration Of Human Resource Programs
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 92 – Public Administration
Blog: NCSC Reports
Guidance and Blog-post
System Time Discovery
Associated Indicators:


