Top 3 API Vulnerabilities : Why Apps are Owned by Cyberattackers