Quantcast
Channel: InfoSec Resources » android
Browsing all 16 articles
Browse latest View live

Android Security: 10 Tips and Settings

You don’t necessarily need to be an android to properly secure your Android device. With a few tips and adhering to a regime of think before you click, we can hopefully demystify some of the otherwise...

View Article



Android Security: Take Control

Are you in control of your Android device? Really? Then answer this brief survey: Has every single app on your phone been installed from the Android market? Have you password protected your device in...

View Article

Under the Hood: Reversing Android Applications

For several years now, there has been an explosive increase in the use of mobile applications. Included in this staggering increase of mobile software are applications that store, process, and transmit...

View Article

Top 10 Tips for Securely Managing Your Employee’s BYOD

Overview: The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to the largest. How each business is dealing...

View Article

RootSmart Android Malware

Summary Android’s increasing popularity, combined with the possibility to create alternative markets, makes this platform a fertile ground for malware authors. While most of these applications just...

View Article


Transforming your Android Phone into a Network Pentesting Device

Lester: Hey Nash, are you scanning our school’s network with just your smartphone? Nash: Well, yes I am! I’m using a network penetration suite just to check out if the students are aware and practicing...

View Article

Inside Android Applications

By the end of 2012, the number of Smartphone shipments around the world will explode to nearly 668 million units, and the Android operating system will have a fifty percent market share. This also...

View Article

Android and Java Native Interface

Java Native Interface (JNI) JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can...

View Article


Sniffing Network Traffic on Android

Introduction There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you’re already paying for. Usually, this requires setting up an access...

View Article


Android Security

Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an...

View Article

Android Architecture and Pen-testing of Android applications

Introduction Android, as we are all aware, is a Linux-based operating system which was initially developed by Android Inc. and was later purchased by Google. It was designed for touch screen devices...

View Article

Android: WhatsApp chat forensic analysis

We all love messaging and using IMs on our smartphones to stay in touch with our friends and family. We use various mobile apps like WhatsApp to IM without having to pay for SMS and this lead to the...

View Article

Android Application hacking with Insecure Bank Part 2

In the previous article, we looked at setting up a mobile pentesting platform for Android applications. By now, you must have set up an emulator using genymotion and installed all the android command...

View Article


Introduction to Reverse Engineering

In computing, reverse engineering is the process of understanding how things work and reusing the information to do something. This is applicable even to Android apps. You might reverse engineer...

View Article

Insecure Data storage with NoSQL Databases

In one of our previous articles, we discussed how Android applications could be vulnerable to insecure data storage. This is a follow-up article to that, as we are going to discuss another flavor of...

View Article


Debugging Apps on Android Emulator Using GDB

This article shows how to debug a process running on a rooted Android device or emulator. Debugging a process is an essential task in order to find memory corruption like vulnerabilities in an...

View Article
Browsing all 16 articles
Browse latest View live




Latest Images