Threats
On the following pages of this guide you’ll find details of some of the most common and dangerous mobile application threats you’re likely to be up against. You’ll learn how bad actors carry out their attacks, why they’re often able to succeed and, most importantly, what you can do to stop them from doing so.
A guide to mobile application protection
- Introduction
-
Principles
Overview - The big picture
- What needs protecting
- Develop a threat model for your application
- The four layers of mobile application protection