Other problem is the lack of security controls in the
applications and information stored in the device. When an
application needs access to some information like contacts,
mails, messages or photos; or when an application needs to
send a message, mail, dial a number, or access to internet,
the system asks the user to grant permissions. [4] This is a
security breach because the users can fail to follow the
company’s security polices, like the use of firewalls or data
encryption; or even does not now the possible risk when
certain permissions are given to the applications. If an
application asks for permissions it does not need, it is
possible to allow the misuse of information and compromise
the company or the user. In the worst case, if the application
is a malware, its possible to allow the lose of sensitive
information stored in the smartphone without notice. The
smartphones operating systems come from computer
systems; therefore, they are vulnerable to the same kinds of
malware.