From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Surveying mobile security guidelines and tools

Surveying mobile security guidelines and tools

From the course: Certified Ethical Hacker (CEH)

Surveying mobile security guidelines and tools

- The Open Web Application Security Project publishes specific information for mobile applications and mobile devices. In 2024, the top 10 mobile risks are what you see here on the screen, improper credentials, supply chain security, all the way down to insufficient cryptography. I would recommend reading through this link here, that's www-project-mobile-top-10, and read the explanations on each one of these and why these are risks. Very important. The mobile App Security Checklist published by OWASP, this is for developers to run through a checklist to determine that their application is relatively secure. It's also a great way as an ethical hacker to learn how to analyze mobile applications and the things you need to be aware of that could be security vulnerabilities, such as improper credential usage. The iGoat Tool Project from OWASP is a series of lessons on iOS to assist a developer in learning the things they need to avoid. Also, OWASP publishes the Damn Vulnerable iOS…

Contents