Comsec Blog on Information Security

Sunday, December 18, 2011

Smartphone Secure Development Guidelines for App Developers

"Smartphone Secure Development Guidelines for App Developers", a collaboration between ENISA and OWASP.

The references at the end of the paper are also helpful.
https://docs.google.com/viewer?a=v&q=cache:LqRnkPEsiMcJ:www.enisa.europa.eu/act/application-security/smartphone-security-1/smartphone-secure-development-guidelines/at_download/fullReport+Smartphone+Secure+Development+Guidelines+for+App+Developers&hl=iw&gl=il&pid=bl&srcid=ADGEESh576JXnkLatRl7Kvpc1D4jgnNJpKR9xWnwx-OZg_SXScxhELVncjtAQQdG7HELNez6Qqv8Ra35_Utof1H9tw2Mvw87DljtXKpNrxmb1Ej5o7bKDC1lgZKQmXkf1s4M-y8ZrZil&sig=AHIEtbRG27ax3ZA_4ZMrB0oPvL3CHmEVcQ

Posted by Comsec Group at 7:58 AM
Newer Post Older Post Home

Comsec Group Blog

Comsec Group, founded in 1987, is a pioneering market leader, providing all-inclusive Cyber and Information Security services to clients around the globe. Our mission is to serve our clients as trusted advisors, by securing their information and operational assets, ensuring the achievement of their business goals.

Share This

Tweet

Contributors

  • Comsec Group
  • Josh Grossman
  • Revitall
  • Stribog
  • Unknown
  • rbg

Search This Blog

Blog Archive

  • ►  2018 (9)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2017 (44)
    • ►  November (3)
    • ►  September (2)
    • ►  August (1)
    • ►  July (4)
    • ►  June (4)
    • ►  May (3)
    • ►  April (8)
    • ►  March (9)
    • ►  February (5)
    • ►  January (5)
  • ►  2016 (9)
    • ►  December (4)
    • ►  November (2)
    • ►  October (1)
    • ►  August (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
  • ►  2014 (4)
    • ►  December (1)
    • ►  February (3)
  • ►  2013 (22)
    • ►  December (1)
    • ►  October (3)
    • ►  September (4)
    • ►  August (3)
    • ►  July (2)
    • ►  June (5)
    • ►  May (3)
    • ►  April (1)
  • ►  2012 (27)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  June (5)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (2)
    • ►  January (8)
  • ▼  2011 (22)
    • ▼  December (5)
      • Adobe plugs two zero-day flaws in Reader and Acrobat
      • 13 Security Trends to Watch in 2012 -- CIO Update
      • Smartphone Secure Development Guidelines for App D...
      • A nice article about tokenization methods
    • ►  November (8)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  February (1)
  • ►  2010 (23)
    • ►  November (2)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (1)
    • ►  January (5)

Labels

Adobe Acrobat (1) application (1) Application Security (7) authentification (1) Banking (1) biometrics (1) Cloud Computing (2) Cloud Security (2) Codefend (2) ComTech (2) Cost Management (1) Crimeware (1) Cybercrime (3) CyberUpdates (30) Data Leakage Prevention (DLP) (2) Data Protection (2) Data Security (3) distruption (1) Embezzlement (1) Employment Opportunities (1) ERP Security (1) FIFA (1) Finance (2) Fraud (2) Fraud Detection and Prevention (1) Google (1) GRC (6) Hackers (3) Hydraq (1) Information Protection and Control (IPC) (2) Information Security (3) InfoSec 2010 (1) Internal Auditors (1) Internet Explorer (2) israel (1) IT Costs (1) IT Security (2) Jobs (1) Josh Grossman (13) Live Stream (1) Malware (3) Mobile Phones (2) News (1) Organised Crime (2) OWASP (1) OWASP Top Ten (2) PA-DSS (2) PCI (3) PCI Compliance (3) PCI DSS (3) PCI:DSS (2) Product Focus (1) SAP Security (2) scanning (1) Secure Software Development Lifecycle (3) Security Code Analysis (1) Security Code Review (2) Security Threats (7) Social Networking (3) Software Security (2) Stuxnet (1) Trojan Horse (1) Virus (1) Vulnerabilities (2) Web 2.0 (1) Web Security (1) World Cup (1) Zero Day Attack (3)
Awesome Inc. theme. Powered by Blogger.