{"id":14490,"date":"2021-09-24T06:33:21","date_gmt":"2021-09-24T06:33:21","guid":{"rendered":"https:\/\/www.sybercode.com\/?page_id=14490"},"modified":"2021-09-24T06:36:11","modified_gmt":"2021-09-24T06:36:11","slug":"mobil-uygulama-sizma-testi","status":"publish","type":"page","link":"https:\/\/www.sybercode.com\/en\/mobil-uygulama-sizma-testi\/","title":{"rendered":"Mobile Application"},"content":{"rendered":"<p>In recent years, as a result of the widespread use of mobile devices and users' preference for mobile transactions, corporations have started to use mobile applications to serve both their employees and customers in addition to all kinds of classical applications. These applications, like web applications, may contain vulnerabilities at different levels, depending on the maturity of the application development lifecycle. The attack area is very wide due to the threats against both the application users and the application itself. \n\nIn mobile application tests, since there are no automated tools for vulnerability detection as in web applications, and the tests of titles such as business logic errors and authorization problems require experience, the expert consultants of the SyberCode team carry out the tests.<\/p>","protected":false},"excerpt":{"rendered":"<p>Son y\u0131llarda mobil cihazlar\u0131n yayg\u0131nla\u015fmas\u0131 ve kullan\u0131c\u0131lar\u0131n mobil i\u015flem yapmay\u0131 tercih etmeleri sonucunda kurumlar her t\u00fcrl\u00fc klasik uygulaman\u0131n yan\u0131nda hem \u00e7al\u0131\u015fanlar\u0131na hem de m\u00fc\u015fterilerine hizmet vermek \u00fczere mobil uygulamalar devreye almaya ba\u015flam\u0131\u015flard\u0131r. Bu uygulamalar da web uygulamalar\u0131nda oldu\u011fu gibi, geli\u015ftirme [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14490"}],"collection":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/comments?post=14490"}],"version-history":[{"count":2,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14490\/revisions"}],"predecessor-version":[{"id":14498,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14490\/revisions\/14498"}],"wp:attachment":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/media?parent=14490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}