Tuesday 12th June, 2012
2:10pm to 3:00pm
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.
Computer security professional located in Gothenburg, Sweden. Likes application security. OWASP Gothenburg chapter co-leader bio from Twitter
Sign in to add slides, notes or videos to this session