NowSecure Launches GovAppDB™ and Threat Assessment Service to Support New Federal Mandates for Mobile Security and Privacy

The solution suite enables agencies to quickly access security threat reports, vulnerability information and SBOMs for commercial mobile app supply chain to support federal tracking and reporting mandates from EO, CISA OMB and DoD

NowSecure Launches GovAppDB™ and Threat Assessment Service to Support New Federal Mandates for Mobile Security and Privacy NowSecure Launches GovAppDB™ and Threat Assessment Service to Support New Federal Mandates for Mobile Security and Privacy Show More
magnifying glass icon

Anatomy of a Mobile Attack

As illustrated below, a mobile attack can involve the device layer, the network layer, the data center, or a combination of these. Inherent platform vulnerabilities and social engineering continue to pose major opportunities for cyber thieves and thus significant challenges for those looking protect user data.

There are three points in the mobile technology chain where malicious parties may exploit vulnerabilities to launch malicious attacks:

  • The device
  • The network
  • The data center

Anatomy of a Mobile Attack (diagram)