OWASP Top 10 Vulnerabilities: #6 Sensitive Data Exposure

This video by IBM’s ethical hacking team outlines how sensitive data can be compromised by hackers through insufficient protection either by encrypting the data at rest and in transit, or by restricting the users who can call such data stored within applications.  Use the latest encryption algorithms to protect sensitive data such as passwords, and disable autocomplete and caching to protect your applications from exposing sensitive data.

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.