Mobile Device Management

Microsoft O365 Mobile Device Management (MDM)

In a hybrid work environment, employees may often work remotely using mobile devices. Since these mobile devices connect to corporate…

3 years ago

STATIC ANALYSIS OF ANDROID APPLICATION

Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many…

3 years ago

Attacking Android Components – Content Providers

In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability.  …

3 years ago

DROZER – Android Security Assessment Framework

Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security…

3 years ago

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…

5 years ago

Code Obfuscation

Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…

5 years ago

Mobile Vulnerability Database (MVD)

Mobile Vulnerability Database, or MVD, is a unique place to find out about vulnerabilities reported worldwide for Mobile Platforms. Introduction…

8 years ago

Android Malwares – An Overview

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to…

10 years ago

Mobile Application Security Assessment – Proxying for IOS (iPhone & iPad)

After an oversight on how to set up Proxying on Android devices and emulators for Application security assessment, let us…

11 years ago

Hacking Google account through Locked Android Devices

Hacking Google account through Locked Android Devices Varutra revealed an issue in the text message notification implementation of Google’s Android…

11 years ago