177
edits
Line 59: | Line 59: | ||
=== App Host Compromise=== | === App Host Compromise=== | ||
Similar to the vulnerable web application case – a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App. | Similar to the vulnerable web application case – the question is asked whether a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App. | ||
====Potential Countermeasures==== | ====Potential Countermeasures==== |
edits