Introduction In today's interconnected world, where smartphones are an extension of our lives, ensuring the security of mobile applications is…
Applications play a crucial role in our lives as we use them for various useful purposes, ranging from shopping, interacting…
In this blog we are going to discuss about android weak host validation and see how android application is not…
Since the threat landscape in the software development ecosystem is ever-evolving, we need to reconsider the security controls used throughout…
Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many…
Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing…
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. …
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security…
BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…
Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…