Completed
Considerations: Mobile ubiquity
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ten Secrets to Secure Mobile Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Introductions
- 3 Considerations: Mobile traffic increases
- 4 Considerations: Mobile ubiquity
- 5 Considerations: Mobile insecurity
- 6 OWASP Mobile Top 10
- 7 Don't Store or Store Securely
- 8 Protect the Server (highlights)
- 9 OWASP ProActive Controls
- 10 Over the Wire
- 11 Poor TLS Implementations
- 12 Unintended Data Leakage
- 13 Know Your Libraries
- 14 Mobile Network Traffic
- 15 Make it hard for the attacker
- 16 Takeaways
- 17 iOS 8 Security
- 18 Swift
- 19 Android ART
- 20 We need help!
- 21 Additional References/Resources
- 22 Reach out! Questions?