When people use mobile apps they seldom think about the security implications. They sign up at an app store and agree to let the app have access to inbuilt sensors and communications capabilities; they also permit access to resources that may include personal data on the Web, corporate data and corporate applications, and/or network access to Web resources that might not be secure. Vulnerabilities can appear at any stage of the interaction between the mobile application and its data.
Advisor
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.