Very important to be secure from this attack vector.
FOCAL POINT will review the security posture of a mobile application from the perspective of a valid user with malicious intent as well as from the perspective of an anonymous user. This process entails testing viable attack vectors identified during the threat analysis phase of the engagement.
Upon the completion of this assessment, FOCAL POINT will have:
The FOCAL POINT mobile application assessment process consists of the following key phases: