Top 5 Ways Hackers Attack Your Mobile Apps

Scott King
1 min readDec 20, 2019

--

This presentation describes the top five ways hackers attack mobile apps looking for secrets. It describes particular attacks, the tools used in the attacks, what specific information the bad actor hopes to obtain, and cites real-world examples of each of the attack methods. The presentation is a collection of dozens of stories and was constructed in collaboration with Zimperium’s zLabs research and development team.

How Hackers Attack Your Mobile Apps:

  1. Authentication Attacks
  2. Authorization Attacks
  3. Spoofing and Tampering Attacks
  4. Racing Resources Attacks
  5. Information Leakage Attacks

Originally published at Scott King.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Scott King
Scott King

Written by Scott King

Marketing Strategist and Head of Marketing at Krista Software.

Responses (1)

Write a response