Another refugee from Storify, this time I was asked for a comment on some research into mobile app IT security and identified the Operating System and physical proximity as the two key attack vectors.
Big Time Pocket Vulnerabilities
Another refugee from Storify, this time I was asked for a comment on some research into mobile app IT security and identified the Operating System and physical proximity as the two key attack vectors.