Posts about security

Cyber Security

M5: Insecure Communication

This one has dropped from number three since the 2016 list. Threat Agents Application Specific Virtually all[…]

Guide to Secure File Storage and Transfer

File storage and transferring hold a very dear place in most people’s lives. However, the safety of[…]

Russia Aligned Threat Actors Breach Secure Messaging Apps

We’ve just learned today that officials within the Trump administration inadvertently shared Yemen strike plans with journalist[…]

Secure Conveyancer

Cybersecurity – 6 Sectors at Risk

Let’s take a look at some specific sectors and assess their risk of cyberattack. If your industry[…]

Cyber Security

M4: Insufficient Input/Output Validation

This is a new one (in this form) for the updated list, although in the 2014 list[…]

Top Business Risks for 2025

The recent report, Allianz Risk Barometer: Identifying the major business risks for 2025 analyses responses from over[…]

Cyber Security

M3: Insecure Authentication / Authorisation

This one has been in the list before, in a few different forms. It’s here as a[…]

Cyber Security

M2: Inadequate Supply Chain Security

Came here from a direct link? Jump to the start of our OWASP Mobile Top 10 series[…]

Cyber Security

M1: Improper Credential Usage

A new addition to the 2024 list, this refers to the hard coding of credentials within source[…]

Cyber Security

OWASP Mobile Top 10 – Overview & Comparison

Back in May 2024 the final version of the updated OWASP Mobile Top 10 security threats was[…]