Defending Behind the Device: Mobile Application Risks

  • Thursday, October 11, 2012 | 08.40 – 09.30 hrs | Buckingham (East Wing)

View all Sessions

Risks to mobile devices are similar to those of traditional software applications and a result of insecure coding practices. But mobile devices aren’t just small computers: they are designed around personal and communication functionality. This makes the top mobile applications risks different from the top traditional computing risks - and an easier opportunity for those with malicious intent.


This document was retrieved from on Sat, 24 Mar 2018 19:39:07 -0400.