Another refugee from Storify, this time I was asked for a comment on some research into mobile app IT security and identified the Operating System and physical proximity as the two key attack vectors.
Another refugee from Storify, this time I was asked for a comment on some research into mobile app IT security and identified the Operating System and physical proximity as the two key attack vectors.