- Phishing
- Buffer Overflow
- Man-in-the-Middle
- Clickjacking
- Data Caching
- Framing
- Weak Passcodes
- Passwords accesible
- Weak Encryption
- iOS Jailbreak
- Android Rooting
- SMishing
- Baseband Attacks
- Source Code
- Vulnerabilities
- Secrets Hardcoded
- Weak Encryption
- Misconfiguration (Permissions)
- Sensitive Data Storage
- Escalated Privileges
- Config. Manipulation
- Improper SSL Validation
- Wi-Fi with no encryption or weak encryption
- Pocket Sniffing
- Man-in-the-Middle
- Session Hijacking
- DNS Poisoning
- SSL Strip
- SSL Certificate
- Vulnerabilities
- Misconfiguration
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (XSRF)
- Weak Input Validation
- Brute Force Attacks
- SQL Injection
- Privilege Escalation
- Data Dumping
- Command Execution (OS)