Vulnerabilities

A security weakness within the system that might allow attackers to exploit it and break the security of the device is called a vulnerability.

For example, if a mobile device is stolen and it does not have a PIN or passcode enabled, it is vulnerable to data theft.

Get Mobile Application Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.