This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mobile Top Ten Contributions"
From OWASP
m (Update with synthesis v0.1) |
m (→Synthesis) |
||
Line 47: | Line 47: | ||
Key observations and trends from the data can be found in here: | Key observations and trends from the data can be found in here: | ||
− | * [ | + | * [http://www.owasp.org/images/b/b5/OWASP_Mobile_Top_Ten_2015_-_Synthesis_Document_v0.1.pdf Synthesis Document v0.1] |
== Additional Thanks == | == Additional Thanks == |
Revision as of 02:51, 2 March 2015
This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.
Project Leads
Strategic Roadmap
Wiki Content
- Zach Lanier
- Mike Zuzman
- Jason Haddix - HP Fortify
- Daniel Miessler - HP Fortify
- Rahil Parikh - Gotham Digital Science
- Ron Gutierrez - Gotham Digital Science
- Jonathan Carter - Arxan Technologies
- Chad Butler - Concur Technologies
Data Contributors
- HP Fortify
- Andreas Athanasoulias & Syntax IT
- Hemil Shah and eSphere Security
- Godfrey Nolan and RIIS (Research Into Internet Systems)
- Arxan Technologies
- Bugcrowd
- Hacklabs
- IBM X-Force Threat Intelligence
- KRVW Associates
- MetaIntelli
- Pure Hacking
- Secure Network
Data
The 2015 data sets are stored at the below link:
https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0
Synthesis
Key observations and trends from the data can be found in here:
Additional Thanks
- Jim Mannico
- Paco Hope