In a hybrid work environment, employees may often work remotely using mobile devices. Since these mobile devices connect to corporate…
Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many…
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. …
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security…
BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…
Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…
Mobile Vulnerability Database, or MVD, is a unique place to find out about vulnerabilities reported worldwide for Mobile Platforms. Introduction…
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to…
After an oversight on how to set up Proxying on Android devices and emulators for Application security assessment, let us…
Hacking Google account through Locked Android Devices Varutra revealed an issue in the text message notification implementation of Google’s Android…