- Exploiting Common iOS Apps’ Vulnerabilities
- M1: Improper Platform Usage
- M2: Insecure Data Storage
- M3: Insecure Communication
- M4: Insecure Authentication
- M5: Insufficient Cryptography
- M6: Insecure Authorization
- M7: Client Code Quality
- M8: Code Tampering
- M9: Reverse Engineering
- M10: Extraneous Functionality
- High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps
- Vulnerabilities and threats in mobile applications, 2019