Monthly Archives: December 2012

Threats and Defenses in the World of Mobile Applications – Part 2

A mobile attack can be done through a device or through the network. A device-based attack is simple and straightforward. For instance, when a laptop is stolen, an attacker can access the system and pull data from it. The presence of unencrypted credentials and sensitive data stored in the cache are the most common targets...

more

Threats and Defenses in the World of Mobile Applications – Part 1

A few years ago, running a competitive business in this economy meant having online presence aside from a traditional brick and mortar store. Later on, it shifted to providing customers with an interactive and engaging experience. These days, however, it’s all about mobile applications on smartphones and tablets. There are risks and rewards that come with...
more

WordPress Image Lightbox Plugin