>
OWASP TOP 10 Mobile
* Reverse Engineering
* Runtime Analysis
* Data Protection (Rest)
* Data Protection (Transit)
* Key Management
* Tampering
* Injection Flaws
* Broken Cryptography
* Memory Management
* URL Scheme Attack
* Social Engineering
* SSL Pinning
* Authentication
* Jailbreak Detection
* Side Channel Data Leaks
* Cloud Misconfiguration
* Crypto Challenges |
iGoat (Objective C) was presented at:
![Demo]("https://github.com/swaroopsy/test/blob/master/Image.png?raw=true" width="200" height="400" )