Top 10 Mobile Controls OWASP/ENISA Collaboration Key observations and trends from the data can be found in here: The 2015 data sets are stored at the below link: Godfrey Nolan and RIIS (Research Into Internet Systems).If we have omitted you, or incorrectly affiliated you, please contact us right away. The corresponding video can be found here: VIDEO.The original presentation can be found here: SLIDES.This list was initially released on Septemat Appsec USA. The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks.We adhered loosely to the OWASP Web Top Ten Project methodology. M8: Security Decisions Via Untrusted Inputs.M5: Poor Authorization and Authentication.M3: Insufficient Transport Layer Protection.Based on feedback, we have released a Mobile Top Ten 2016 list following a similar approach of collecting data, grouping the data in logical and consistent ways.įeel free to visit the mailing list as well! Top 10 Mobile Risks - Final List 2016 This list has been finalized after a 90-day feedback period from the community. Updates to the wiki content including cross-linking to testing guides, more visual exercises, etc.Our goals for the 2016 list included the following: So the top ten categories are now more focused on Mobile application rather than Server. This helped us to analyze and re-categorize the OWASP Mobile Top Ten for 2016. In 2015, we performed a survey and initiated a Call for Data submission Globally.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |