This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP Mobile Security Project - Top Ten Mobile Risks"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
== About this list  ==
 
== About this list  ==
  
'''An effort to refresh the Top 10 for 2014 is currently underway. Details can be found here: [http://owasp.blogspot.com/2013/05/2013-owasp-mobile-top-10-call-for-data.html OWASP Mobile Top 10 Call For Data]'''
+
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape.  
  
 +
Our road-map for 2014 includes:
 +
 +
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.
 +
* A PDF release.
 +
 +
We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.
  
  
Line 17: Line 23:
 
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]
 
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]
 
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]
 
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]
 +
 +
  
  
Line 40: Line 48:
 
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
 
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
 
*[[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]
 
*[[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]
 +
 +
 +
 +
== Project Methodology ==
 +
 +
We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology].

Revision as of 08:05, 27 January 2014

About this list

In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape.

Our road-map for 2014 includes:

  • More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.
  • A PDF release.

We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.


Top 10 Mobile Risks, Release Candidate 2014 v1.1 (To be updated 1/27/2014)

2014-01-26 20-23-29.png







Contributors


Archive

The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  

The original presentation can be found here: SLIDES
The corresponding video can be found here: VIDEO


Project Methodology

We adhered loosely to the OWASP Web Top Ten Project methodology.