Network attacks: an overview
There are many different attacks, that fall into categories. Their understanding help you guard against them and develop security processes to prevent unauthorized access to your information system.
Injection attacks, and particularly SQL Injections, are the most commonly exploited vulnerabilities by hackers. Learn more about injection attacks, and how to prevent them.
Session hijacking, XSS and CSRF
Communication infrastructure security and the Man in the middle
You have implemented encryption of the communication between your mobile devices and your server. In view of some recent examples, how to ensure communication security at all stages?