Your mobile device is an interface into systems that can store potentially sensitive information about you, your company or your employer. Given its ease of use and portability, one would expect to find unique, strong credentials to guard against unauthorized access to these resources. In practice, however, credentials tend to be reused – increasing the Read more…
Tags: Mobile, mobile security, OWASP
Most mobile device applications have serious security vulnerabilities. These flaws include the storage and transmission of unencrypted data, poor session handling, and data leakage. McAfee addresses many of the management and compliance challenges through its Mobile Security Strategy. The Open Web Application Security Project (OWASP) Mobile Security Project focuses on the security of the applications Read more…
Tags: application security, Gartner, mobile security, OWASP, ViaForensics
Cyber Security Conferences have been around almost as long as Cyber Security itself, but are they worth attending? During this month’s #SecChat, Thursday, July 28 at 11am PT, we want you to sound off and make yourself heard regarding our industry’s mass of mainstream and “hacker” security events. We want to know what you, as Read more…
Tags: #SecChat, Blackhat, DefCon, enterprise, Interop, OWASP, RSA, SecTor, security conferences
Posts tagged under OWASP