
Am I Vulnerable to OWASP Insecure Data Storage? File systems on devices are no longer a sandboxed environment and rooting or jailbreaking usually circumvents any protections. Interestingly, most of the top mobile application security breaches have been caused by insecure or unnecessary client-side data storage. Many developers assume that storing data on client-side will restrict other users from having access to this data. The title says it all, insecure storage of data. This week, we talk about the second most exploited threat in mobile applications, Insecure Data Storage. Last week, we wrote about the most prevalent of the Top 10 Mobile risks, i.e. That's when the Top 10 list for mobile applications was started. In early 2012 OWASP realized that the application landscape had shifted. Ever since, the “ OWASP Top Ten” project has been a huge success.


The OWASP Top 10 Project started in 2007 when they released a list of the top 10 most prevalent web application vulnerabilities in order to help educate developers and testers. The Open Web Application Security Project (OWASP) has been working towards categorizing, evangelizing, and publishing remediation information for web application security for 12 years.
