Mobile application security issues: Overview of practices to plug vulnerabilities – 4 - Shezartech
11425
post-template-default,single,single-post,postid-11425,single-format-standard,mkd-core-1.0.2,sparks child-child-ver-1.0.0,sparks-ver-1.5,mkd-smooth-scroll,mkd-smooth-page-transitions,mkd-ajax,mkd-grid-1300,mkd-blog-installed,mkd-header-standard,mkd-sticky-header-on-scroll-down-up,mkd-default-mobile-header,mkd-sticky-up-mobile-header,mkd-dropdown-default,mkd-header-style-on-scroll,mkd-full-width-wide-menu,mkd-header-standard-in-grid-shadow-disable,wpb-js-composer js-comp-ver-6.8.0,vc_responsive

Mobile application security issues: Overview of practices to plug vulnerabilities – 4

Web applications comprise of critical application data and a majority of application functionality. Therefore, a mobile application’s security is a critical aspect. There are some activities if permitted by web applications to be done by users, can be used to breach the application’s security. A few potential security loopholes of these types are illustrated below

Terminating User Session

Servers maintain user sessions. Those sessions contain user-specific information. When a user’s session is active at the server, he/she does not need to authenticate upon visiting the portal. This scenario can be exploited by an attacker. In case the access is gained to a user’s machine, then an infiltrator can access the user’s data stored on the server, inflicting damage, subsequently. Read More…

Weak Password Policy

Allowing users to set weak passwords is not ideal. A weak password can be guessed easily, leading to access gain. Applications must enforce a strong password policy to avoid access by illegitimate users. Setting a hard password makes it difficult to guess, reducing the possibility of password theft. Read More…

Enabling Auto-Complete Feature

Enabling the auto-complete feature fills up data into form fields, automatically. A few data items amongst that data could be sensitive, though. In case a person with malicious intent gains access to a user’s browser, he/she can obtain sensitive the information auto-populated by the browser. Read More…

Clickjacking

The malpractice of getting users to perform a different activity than intended is known as clickjacking. Such activities are used for malicious purposes like stealing money from a user’s bank account etc. Attackers make use of a user interface element called iframe for carrying out such activity. Using iframe allows one webpage to be displayed within another. Read More…

Allowing Simultaneous Logins

Many applications allow users to log in from multiple machines, simultaneously. This facility is convenient for users but can lead to a security breach. A person who gains access to the session URL and other device-specific information can gain access to the application using that information. Read More…