Misconfiguration of third party mobile apps exposes the data of 100 million users
Check Point Research backend code. Credit: Check Point Research Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification management, real-time databases, and analytics—many developers of these solutions fail to properly take into account the potential security risks involved when these apps are misconfigured. Most recently, Check Point Research has… Read More »