How to identify risky mobile apps and the threats they pose - Save your seat To view this email as a web page,
click here August 28th at 2:00 PM EDT |
Attendees of this live webcast may be eligible for CPE credit. |
Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary to leaking Personally Identifiable Information (PII) and everything in between. Save your seat now to learn how to identify such threats, protect data and fortify mobile security by exploring the following 8 types of risky mobile apps, including the attack processes and advantages for bad actors: |
|
Overprivileged Harvester Colluding Shifty Sloppy Leaky Chatty Sticky |
| |
| Or copy and paste the URL below into your browser: https://www.scmagazine.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them |
| |
|
|
..