Главная
Study mode:
on
1
OWASP Top 10 Mobile Risks
2
Introductions
3
Mobile Threat Model
4
Top 10 Risks
5
Insecure Data Storage
6
Weak Server Side Controls
7
Insufficient Transport Layer Protection
8
Client Side Injection
9
Poor Authorization and Authentication
10
Improper Session Handling
11
Security Decisions Via Untrusted Inputs
12
Side Channel Data Leakage
13
M9- Broken Cryptography Prevention Tips
14
Sensitive Information Disclosure
15
Conclusion
Description:
Explore the critical landscape of mobile security in this 48-minute conference talk from LASCON. Delve into the OWASP Top 10 Mobile Risks as presented by experts Jack Mannino, Mike Zusman, and Zach Lanier. Learn about mobile threat modeling and gain insights into key vulnerabilities such as insecure data storage, weak server-side controls, and insufficient transport layer protection. Discover the dangers of client-side injection, poor authorization and authentication, and improper session handling. Understand how security decisions via untrusted inputs and side channel data leaks can compromise mobile applications. Examine broken cryptography prevention tips and strategies to mitigate sensitive information disclosure. Equip yourself with essential knowledge to enhance mobile application security and protect against prevalent threats in the mobile ecosystem.

OWASP Top 10 Mobile Risks

LASCON
Add to list
0:00 / 0:00