Posts by admin

7 Ways Using AI for Work Can Get Complicated

AI is going to change how we work. It can make some tasks easier. But it can[…]

Cyber Security

M4: Insufficient Input/Output Validation

This is a new one (in this form) for the updated list, although in the 2014 list[…]

Top Business Risks for 2025

The recent report, Allianz Risk Barometer: Identifying the major business risks for 2025 analyses responses from over[…]

10 Steps to Prevent a Data Breach

What is a data breach? A data breach is when someone steals information. This can be names,[…]

Cyber Security

M3: Insecure Authentication / Authorisation

This one has been in the list before, in a few different forms. It’s here as a[…]

How to Spot Hidden Malware on Your Devices

Malware is malicious software that can cause damage on your computer, phone or tablet. It can make[…]

How to Minimise, or Even Better, Avoid Ransomware Damage

Ransomware has now become a big problem for many people and businesses. It can lock up your files[…]

Cyber Security

M2: Inadequate Supply Chain Security

Came here from a direct link? Jump to the start of our OWASP Mobile Top 10 series[…]

Obiquitech Cyber Hygiene Tips for 2025

How is Your Cyber Hygiene – Essential Tips for 2025

Cyber hygiene is super important. It’s like brushing your teeth but for your online life. Good cyber[…]

What is Threat Exposure Management (TEM)?

Threat Exposure Management (TEM) is an important cybersecurity tool. It helps organizations find and fix weak spots[…]