Digital Forensics and Incident Response | DFIR
  • Blog
  • Infosec
  • Windows Forensics
  • Mac Forensics
  • Memory Forensics
  • Incident Response
  • Cloud Security

Mobile App Risks

4/5/2020

0 Comments

 
  • Weak Server Side Control
  • Insecure Data Storage
  • Insufficient Transport Layer Protection 
  • Unintended Data Leakage
  • Insecure Authorization and Authentication
  • Insufficient Cryptography
  • Client Side Injection
  • Security Decisions via Untrusted Inputs
  • Improper Session Handling 
  • Lack of Binary Protection
  • Improper Platform Usage
  • Insecure Communication
  • Code Tempering 
  • Reverse Engineering 
  • Extraneous Functionality 
0 Comments



Leave a Reply.

    Categories

    All
    Chapter-1
    CISSP
    SOC
    Threat Detection
    Threat Hunting
    Threat Modelling

    RSS Feed