Another refugee from Storify, this time I was asked for a comment on some research into mobile app IT security and identified the Operating System and physical proximity as the two key attack vectors.

Big Time Pocket Vulnerabilities
Tagged on:                 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.