THE DFIR BLOG
Menu

    Cyber Security

Mobile App Risks

4/5/2020

0 Comments

 
  • Weak Server Side Control
  • Insecure Data Storage
  • Insufficient Transport Layer Protection 
  • Unintended Data Leakage
  • Insecure Authorization and Authentication
  • Insufficient Cryptography
  • Client Side Injection
  • Security Decisions via Untrusted Inputs
  • Improper Session Handling 
  • Lack of Binary Protection
  • Improper Platform Usage
  • Insecure Communication
  • Code Tempering 
  • Reverse Engineering 
  • Extraneous Functionality 
0 Comments



Leave a Reply.

    RSS Feed

    Subscribe to Newsletter

    Categories

    All
    AI
    CISO
    CISSP
    CKC
    Data Beach
    Incident Response
    LLM
    SOC
    Technology
    Threat Detection
    Threat Hunting
    Threat Modelling

  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me
  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me