When people use mobile apps they seldom think about the security implications. They sign up at an app store and agree to let the app have access to inbuilt sensors and communications capabilities; they also permit access to resources that may include personal data on the Web, corporate data and corporate applications, and/or network access to Web resources that might not be secure. Vulnerabilities can appear at any stage of the interaction between the mobile application and its data.
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.
Member/Guest loginForgot your password?