OWASP Mobile Top 10 Vulnerabilities and Mitigation Strategies

According to Statista, there are 3.5 billion smartphone users. That means a lot of people could become victims of insecure mobile apps.

The OWASP Mobile Top 10 list is a great resource for app developers who want to create secure apps. That's because many mobile apps are inherently vulnerable to security risks. Let's think about some of the attacks on mobile apps that have occurred in the past few years. There was the WhatsApp Pegasus spyware that enabled attackers to control victims' devices. Another was the attack on the Pokémon Go app, where users could reverse-engineer the app to catch more Pokémon.

10 IoT Security Tips You Can Use to Secure Your IoT Devices

IoT is something of a double-edged sword. While it makes life so much simpler to have a smart home with a smart lock, and a Wi-Fi kettle that boils the water for your morning tea automatically, it comes at a price that may cost you significantly more than what’s on the price tag. In IoT security, there are security trade-offs and, unfortunately, these can do more harm than good, and almost make you miss the days when there was nothing “smart” about your TV! 

Let’s take a look at some examples to drive home the importance of security before we welcome this technology into our homes, our industries, and our everyday lives.