The same Web security rules apply regardless of the client being used. The good news is that exploitation via phone...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
is not quite as easy or convenient. The bad news is that the mobile-centric pages are still accessible to everyone on the Web. The best recommendation is to find and fix the flaws in your existing code before your port it over to the mobile world. For those who've already gone mobile be sure to include the mobile code in your security testing. Even though it may look the same there could be some nuances that lead to security flaws.
Here are some articles I can recommend for testing rich internet applications, Web 2.0 and other online security concerns:
Dig Deeper on Mobile Application Testing Techniques and Tools
Related Q&A from Kevin Beaver
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains ...continue reading
Enterprise network security expert Kevin Beaver compares and contrasts the roles of an inbound firewall and an outbound firewall. Find out what the ...continue reading
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.