OWASP mobile top 10 — M2.2016: Insecure Data Storage

3 years ago 142
BOOK THIS SPACE FOR AD
ARTICLE AD

Thexssrat

We already touched on this topic a little in the first chapter M1.2016 but it is a bit more complicated then it seems at first. To gain something from this vulnerability thought is not very easy. The bad actor needs access to the device or needs to have an app installed that has access to the storage on the mobile device of the victim. This makes the attack vector a little bit more complicated but there is still a possibility of very big impact if the incorrectly stored data is sensitive information, partially due to…

To keep reading this story, get the free app or log in.

Read the rest of this story with a free account.

You’ll also discover more fresh thinking personalized to your interests and can follow your favorite authors, publications, and topics.

Or, continue in mobile web

Already have an account?

Sign in

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store

A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store

Read Entire Article