Android Security: 10 Tips and Settings
You don’t necessarily need to be an android to properly secure your Android device. With a few tips and adhering to a regime of think before you click, we can hopefully demystify some of the otherwise...
View ArticleAndroid Security: Take Control
Are you in control of your Android device? Really? Then answer this brief survey: Has every single app on your phone been installed from the Android market? Have you password protected your device in...
View ArticleUnder the Hood: Reversing Android Applications
For several years now, there has been an explosive increase in the use of mobile applications. Included in this staggering increase of mobile software are applications that store, process, and transmit...
View ArticleTop 10 Tips for Securely Managing Your Employee’s BYOD
Overview: The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to the largest. How each business is dealing...
View ArticleRootSmart Android Malware
Summary Android’s increasing popularity, combined with the possibility to create alternative markets, makes this platform a fertile ground for malware authors. While most of these applications just...
View ArticleTransforming your Android Phone into a Network Pentesting Device
Lester: Hey Nash, are you scanning our school’s network with just your smartphone? Nash: Well, yes I am! I’m using a network penetration suite just to check out if the students are aware and practicing...
View ArticleInside Android Applications
By the end of 2012, the number of Smartphone shipments around the world will explode to nearly 668 million units, and the Android operating system will have a fifty percent market share. This also...
View ArticleAndroid and Java Native Interface
Java Native Interface (JNI) JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can...
View ArticleSniffing Network Traffic on Android
Introduction There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you’re already paying for. Usually, this requires setting up an access...
View ArticleAndroid Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an...
View ArticleAndroid Architecture and Pen-testing of Android applications
Introduction Android, as we are all aware, is a Linux-based operating system which was initially developed by Android Inc. and was later purchased by Google. It was designed for touch screen devices...
View ArticleAndroid: WhatsApp chat forensic analysis
We all love messaging and using IMs on our smartphones to stay in touch with our friends and family. We use various mobile apps like WhatsApp to IM without having to pay for SMS and this lead to the...
View ArticleAndroid Application hacking with Insecure Bank Part 2
In the previous article, we looked at setting up a mobile pentesting platform for Android applications. By now, you must have set up an emulator using genymotion and installed all the android command...
View ArticleIntroduction to Reverse Engineering
In computing, reverse engineering is the process of understanding how things work and reusing the information to do something. This is applicable even to Android apps. You might reverse engineer...
View ArticleInsecure Data storage with NoSQL Databases
In one of our previous articles, we discussed how Android applications could be vulnerable to insecure data storage. This is a follow-up article to that, as we are going to discuss another flavor of...
View ArticleDebugging Apps on Android Emulator Using GDB
This article shows how to debug a process running on a rooted Android device or emulator. Debugging a process is an essential task in order to find memory corruption like vulnerabilities in an...
View Article
More Pages to Explore .....