This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP Mobile Security Project - Top Ten Mobile Risks"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
== About this list  ==
 
== About this list  ==
  
'''An effort to refresh the Top 10 for 2013 is currently underway. Details can be found here: [http://owasp.blogspot.com/2013/05/2013-owasp-mobile-top-10-call-for-data.html OWASP Mobile Top 10 Call For Data]'''
+
'''An effort to refresh the Top 10 for 2014 is currently underway. Details can be found here: [http://owasp.blogspot.com/2013/05/2013-owasp-mobile-top-10-call-for-data.html OWASP Mobile Top 10 Call For Data]'''
  
The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  
 
  
The original presentation can be found here:&nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]<br>
 
  
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
+
== Top 10 Mobile Risks, Release Candidate 2014 v1.1 (To be updated 1/26/2014)==
 +
[[File:Topten_2014.png|right|550px]]
 +
*[[Mobile_Top_10_2014-M1|M1:  ]]
 +
*[[Mobile_Top_10_2014-M2|M2:  ]]
 +
*[[Mobile_Top_10_2014-M3|M3:  ]]
 +
*[[Mobile_Top_10_2014-M4|M4:  ]]
 +
*[[Mobile_Top_10_2014-M5|M5:  ]]
 +
*[[Mobile_Top_10_2014-M6|M6:  ]]
 +
*[[Mobile_Top_10_2014-M7|M7:  ]]
 +
*[[Mobile_Top_10_2014-M8|M8:  ]]
 +
*[[Mobile_Top_10_2014-M9|M9: ]]
 +
*[[Mobile_Top_10_2014-M10|M10: ]]
  
== Top 10 Mobile Risks, Release Candidate v1.0 ==
 
[[File:Topten.png|right|550px]]
 
*[[Mobile_Top_10_2012-M1|M1: Insecure Data Storage ]]
 
*[[Mobile_Top_10_2012-M2|M2: Weak Server Side Controls ]]
 
*[[Mobile_Top_10_2012-M3|M3: Insufficient Transport Layer Protection ]]
 
*[[Mobile_Top_10_2012-M4|M4: Client Side Injection ]]
 
*[[Mobile_Top_10_2012-M5|M5: Poor Authorization and Authentication ]]
 
*[[Mobile_Top_10_2012-M6|M6: Improper Session Handling ]]
 
*[[Mobile_Top_10_2012-M7|M7: Security Decisions Via Untrusted Inputs ]]
 
*[[Mobile_Top_10_2012-M8|M8: Side Channel Data Leakage ]]
 
*[[Mobile_Top_10_2012-M9|M9: Broken Cryptography ]]
 
*[[Mobile_Top_10_2012-M10|M10: Sensitive Information Disclosure ]]
 
  
  
  
 +
== Contributors ==
  
 +
*[[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]]
  
  
  
 +
== Archive ==
  
 +
The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks. &nbsp;This list was initially released on September 23, 2011 at Appsec USA. &nbsp;
  
 
+
The original presentation can be found here:&nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]<br>
 
+
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
 
+
*[[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]
== Contributors ==
 
 
 
*[[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]]
 

Revision as of 04:15, 27 January 2014

About this list

An effort to refresh the Top 10 for 2014 is currently underway. Details can be found here: OWASP Mobile Top 10 Call For Data


Top 10 Mobile Risks, Release Candidate 2014 v1.1 (To be updated 1/26/2014)



Contributors


Archive

The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  

The original presentation can be found here: SLIDES
The corresponding video can be found here: VIDEO