This presentation describes the top five ways hackers attack mobile apps looking for secrets. It describes particular attacks, the tools used in the attacks, what specific information the bad actor hopes to obtain, and cites real-world examples of each of the attack methods. The presentation is a collection of dozens of stories and was constructed in collaboration with Zimperium’s zLabs research and development team.
How Hackers Attack Your Mobile Apps:
- Authentication Attacks
- Authorization Attacks
- Spoofing and Tampering Attacks
- Racing Resources Attacks
- Information Leakage Attacks
Originally published at Scott King.