Considering the fact that the use of various kinds of mobile devices is a daily routine, and the efficiency of mobile systems constantly increases, we should not forget about the safety of the web-applications because they can be a “window” for violators penetrations.

Nowadays we observe a lot of various applications on each mobile device, each of which has its own specifics of creation. It allows to create just as specific and refined threats, and also implement them by the theft of personal and corporate data not mentioning the penetration to intranet.

Submit application