Ten Secrets to Secure Mobile Applications

Ten Secrets to Secure Mobile Applications

OWASP Foundation via YouTube Direct link

Considerations: Mobile ubiquity

4 of 22

4 of 22

Considerations: Mobile ubiquity

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Ten Secrets to Secure Mobile Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Introductions
  3. 3 Considerations: Mobile traffic increases
  4. 4 Considerations: Mobile ubiquity
  5. 5 Considerations: Mobile insecurity
  6. 6 OWASP Mobile Top 10
  7. 7 Don't Store or Store Securely
  8. 8 Protect the Server (highlights)
  9. 9 OWASP ProActive Controls
  10. 10 Over the Wire
  11. 11 Poor TLS Implementations
  12. 12 Unintended Data Leakage
  13. 13 Know Your Libraries
  14. 14 Mobile Network Traffic
  15. 15 Make it hard for the attacker
  16. 16 Takeaways
  17. 17 iOS 8 Security
  18. 18 Swift
  19. 19 Android ART
  20. 20 We need help!
  21. 21 Additional References/Resources
  22. 22 Reach out! Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.