BOOK THIS SPACE FOR AD
ARTICLE ADWe already touched on this topic a little in the first chapter M1.2016 but it is a bit more complicated then it seems at first. To gain something from this vulnerability thought is not very easy. The bad actor needs access to the device or needs to have an app installed that has access to the storage on the mobile device of the victim. This makes the attack vector a little bit more complicated but there is still a possibility of very big impact if the incorrectly stored data is sensitive information, partially due to…
To keep reading this story, get the free app or log in.
Read the rest of this story with a free account.
You’ll also discover more fresh thinking personalized to your interests and can follow your favorite authors, publications, and topics.
Or, continue in mobile web
Already have an account?