Mobile devices are the subject of many security discussions, but it’s often mobile applications that serve as attack vectors. Bad data storage practices, malware, sideloading and lack of encryption all contribute to mobile application vulnerabilities. It’s important for users to …

Top five mobile application vulnerabilities Read more »