Use the revised OWASP Top Ten to secure your Web applications -- Part 8
Source: Tom Olzak
In this final installment in the revised Open Web Application Security Project (OWASP) Top 10 series, the final three vulnerabilities are explored -- insecure cryptographic storage, insecure communications, and failure to restrict URL access. Tom Olzak explains the nature of these weaknesses followed by recommendations for protecting Web applications from related attacks.
This download is also available as a TechRepublic blog.