{"id":1210,"date":"2025-10-09T16:39:34","date_gmt":"2025-10-09T14:39:34","guid":{"rendered":"https:\/\/addyet.xyz\/it-security\/mobile-and-web-application-security"},"modified":"2025-12-22T12:35:43","modified_gmt":"2025-12-22T11:35:43","slug":"mobile-and-web-application-security","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security","title":{"rendered":"Mobile and Web-Application-Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fd06ec3c{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69dd0fd06ec3c\"><span class=\"vcex-heading-inner wpex-inline-block\">Mobile and Web-Application-Security<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]Mobile applications and web-based services play a major role for modern companies. These applications can optimize business processes and improve interaction with customers and prospects. Despite the convincing advantages, however, these applications pose significant security risks if they are implemented incorrectly. Successful attacks can lead to the theft of sensitive data or affect the availability of the applications themselves.<\/p>\n<p>With @-yet, you can make your mobile and web-based applications more secure. Our security experts will check your applications using the latest analysis methods, check the source code for potential security vulnerabilities and raise your developers&#8217; awareness of secure programming.[\/vc_column_text]<style>.vcex-button.vcex_69dd0fd07089f{font-size:1.2rem;}<\/style><a href=\"#form\" class=\"vcex-button theme-button inline header-button vcex_69dd0fd07089f\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fd0717f0{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-center vc_custom_1765886294319 vcex_69dd0fd0717f0\"><span class=\"vcex-heading-inner wpex-inline-block\">Mobile- and Web Application Security with @-yet<\/span><\/h2>[vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fd0727a0 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fd0727a0 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fd0727a0 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fd0727a0 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fd0727a0\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Manual analyses<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>The @-yet teams carry out all analyses manually. Automatic scans are only used for support.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fd0741a3 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fd0741a3 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fd0741a3 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fd0741a3 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fd0741a3\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">20 years of success<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Since its foundation in 2002, the security analysis of web applications has been one of @-yet&#8217;s core competencies.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fd075274 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fd075274 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fd075274 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fd075274 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fd075274\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">State-of-the-art analysis procedures<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>The analyses of @-yet are carried out in state-of-the-art test environments based on containers and Kubernetes clusters.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886400322{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_family=&#8221;Open Sans&#8221;]Find vulnerabilities before they become security problems[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd076576{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd076576\"><span class=\"vcex-heading-inner wpex-inline-block\">Security of mobile applications with @-yet<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]The programs that make every smartphone truly usable are also an indispensable part of the business world. Most companies use well-known apps to communicate with their employees. And many employees use apps for their daily work. Just as many companies offer their customers their own apps. Especially in the area of health insurance and banking, having your own apps is the standard today. Often these apps exchange sensitive data with server systems in the background. Secure data exchange is essential here.<\/p>\n<p>If you are planning to use an app from the App or Play Store, @-yet will thoroughly check this app for you. You will then receive a detailed report that takes into account all aspects of security. In particular, the @-yet team will thoroughly examine secure data storage on the iOS or Android devices themselves, the external interfaces and communication with any backend systems.<\/p>\n<p>If you have developed an app yourself and would like to make it available to your employees or customers, @-yet can help you make your application more secure. Our security experts evaluate the source code of your applications using manual and automatic code checks to identify insecure code patterns or implementation errors. The security of the data stored on the devices is also subjected to intensive testing. And a look at existing interfaces reveals whether the app is transferring sensitive data to the back-end systems in a secure manner.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886421859{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Are your web applications vulnerable?[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd076cb2{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd076cb2\"><span class=\"vcex-heading-inner wpex-inline-block\">Vulnerability analysis and penetration tests<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Without modern web applications, many services would be virtually unthinkable. Managing customer data yourself, ordering in an online shop, taking out insurance online \u2013 these are just a few examples of how web applications optimize business processes or even make them possible in the first place. These services can also be realized with mobile apps, which have a lot in common with web applications. Nevertheless, @-yet security experts still consider web applications separately.<\/p>\n<p>The @-yet analyses not only cover the web applications themselves, but also the underlying technology. This includes, for example, the configuration of the web server. The analysis also examines errors in the logic of the applications and checks for vulnerabilities in the authentication process. In addition, @-yet performs automated and manual penetration tests to simulate realistic attack scenarios. If a vulnerability is found, @-yet experts attempt to access the underlying systems and thus check what damage the exploitation of the vulnerability in question can actually cause. After all, the ultimate goal is to ensure the security of the backend systems and the data stored on them.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886756745{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Small mistakes with a big impact[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd077464{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd077464\"><span class=\"vcex-heading-inner wpex-inline-block\">Faulty apps are a threat to business-critical data<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]It is often the details that determine the security of an application. Input data is insufficiently checked, data is transmitted unencrypted or stored on the end device without appropriate security measures. Even hard-coded access data for communication with backend systems are security-critical errors that are repeatedly found by @-yet teams. All these vulnerabilities not only jeopardize the availability of the applications themselves, but are primarily a risk for the sensitive data stored on the underlying systems. Thus, insecure apps are often also a danger to the data of all users.<\/p>\n<p>@-yet helps you to identify and eliminate security-critical vulnerabilities. Using standardized testing guides and generally accepted test procedures, @-yet&#8217;s security experts thoroughly and reliably test every mobile app and web application.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765886503375{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #00056E !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fd077d8c{color:#ffffff;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dd0fd077d8c\"><span class=\"vcex-heading-inner wpex-inline-block\">Modern mobile and web-based applications<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]are complex systems. A large number of technologies are used to determine the server and backend systems. Various frameworks are used in the development of apps, which significantly increases the complexity. However, @-yet is familiar with and understands this complexity \u2013 especially through countless manual analyses. This way of working means that @-yet&#8217;s results are close to current developments and technologies. They are familiar with the most common weak points and problems of modern technologies. With this knowledge and many years of experience, @-yet ensures the security of your business-critical and sensitive data.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886543611{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]@-yet Mobile and Web Application Security[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd0787e2{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd0787e2\"><span class=\"vcex-heading-inner wpex-inline-block\">What can @-yet do for you?<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Self-developed smartphone apps or web applications can have vulnerabilities. This also applies to apps from the App Store or Play Store. Manual and automatic checks reveal insecure code patterns or errors in the logic. Penetration tests simulate attack scenarios and check secure data transmission via existing interfaces. The aim is to protect the data stored on the devices or in the backend.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886579065{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Methodology of @-yet Mobile and Web Application Security[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd079273{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd079273\"><span class=\"vcex-heading-inner wpex-inline-block\">How @-yet works<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-bullets.vcex_69dd0fd079e33 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dd0fd079e33{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dd0fd079e33\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Comprehensive code and logic checks<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Verification of secure data storage on the mobile devices<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Automated and manual penetration tests<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Technical analysis of web servers, interfaces and backend systems<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Detailed final report<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765886643772{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Mobile and web application security with @-yet[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fd07a9a8{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fd07a9a8\"><span class=\"vcex-heading-inner wpex-inline-block\">These are your advantages<\/span><\/h2><style>.vcex-bullets.vcex_69dd0fd07b172 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dd0fd07b172{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dd0fd07b172\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">In-depth experience with current technologies through numerous analyses<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Review of every app or web application<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Ensuring the secure transmission and storage of sensitive data<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Comprehensive and detailed analyses through manual test procedures<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Raising your developers&#8217; awareness of secure coding<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-bottom-width:1px;border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69dd0fd081419{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69dd0fd081419\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/1210' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='YTZEeDcs4qsH2y7Qxp9OMr7aN3rwmN4cadPIqivfSR66oHvcULPPVUgwQhbxBBT4sHmT3qrtuwvUfaI6dSPrd8R2G0Q0FwdroLJP3BMKaGXkz6M=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Mobile and Web-Application-Security Mobile applications and web-based services play a major role for modern companies. These applications can optimize business processes and improve interaction with customers and prospects. Despite the convincing advantages, however, these applications pose significant security risks if they are implemented incorrectly. Successful attacks can lead to the theft of sensitive data or&hellip;","protected":false},"author":2,"featured_media":0,"parent":887,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1210","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile and Web-Application-Security - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile and Web-Application-Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:35:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/mobile-and-web-application-security\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/mobile-and-web-application-security\",\"name\":\"Mobile and Web-Application-Security - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-10-09T14:39:34+00:00\",\"dateModified\":\"2025-12-22T11:35:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/mobile-and-web-application-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/mobile-and-web-application-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/mobile-and-web-application-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile and Web-Application-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile and Web-Application-Security - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security","og_locale":"en_US","og_type":"article","og_title":"Mobile and Web-Application-Security","og_url":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security","og_site_name":"@-yet","article_modified_time":"2025-12-22T11:35:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security","url":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security","name":"Mobile and Web-Application-Security - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-10-09T14:39:34+00:00","dateModified":"2025-12-22T11:35:43+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/it-security\/mobile-and-web-application-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"IT security","item":"https:\/\/www.at-yet.de\/en\/it-security"},{"@type":"ListItem","position":3,"name":"Mobile and Web-Application-Security"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":4,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1210\/revisions"}],"predecessor-version":[{"id":1806,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1210\/revisions\/1806"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/887"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}