Man In the Middle attack can be performed with different tools and different mechanism. Here in this post i would like to highlight 2 attack vectors which are as follows: Rogue Cell Towers (Also known as StingRay in Cyber Forensics) IP Spoofing in a WiFi Network (Using Cain N Abel) […]
Day: May 12, 2017
Is SSL connection secure?
Mobile applications frequently do not protect network traffic. They may use SSL/TLS during authentication but not elsewhere. This inconsistency leads to the risk of exposing data and session IDs to interception. The use of transport security does not mean the app has implemented it correctly. The diagram below illustrates how […]
Why Auto Correct, Auto Complete is hazardous for mobile apps dealing with sensitive data.
About 80% of the apps out there today are insecure and can be compromised easily, this is what recent studies have shown. Why this complacency? Are the businesses not serious about it. The answer is everyone today from a startup to an enterprise is more conservative about data security. Still […]