Mobile app vulnerabilities (as covered in Chapter 30) - Web dashboard vulnerabilities (as covered in Chapter 15) - Insecure device pairing and provisioning