Android

Man-in-the-Disk Attack Shows How External Storage by App Opens An Android Phone To Serious Attacks

The Man-in-the-Disk Attack open's a new attack surface that would allow an attacker to replace, or to manipulate the data…

7 years ago

Google Removed 145 Malicious Apps from Google Play Store that Carries Windows Malware

Google removed around 145 apps from the Google Play store that infected by Windows Malware which are not developed to…

7 years ago

Monitor Android/iOS Mobile Phones Remotely using Best Cell Phone Spy Softwares

Surveillance industries are getting bigger and monitoring is one of the essentials things to keep running a business in a…

7 years ago

Google Officially Banned Crypto-Currency Mining Apps From Play Store

Google officially banned the Crypto-currency mining apps from Play Store and Google updated its privacy policies which say, "We don't…

7 years ago

Android Application Penetration Testing – Part 6

Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10. M1 - Improper Platform Usage  …

7 years ago

Android Application Penetration Testing – Part 12

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some…

7 years ago

Android Application Penetration Testing – Part 11 – Android Checklist

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some…

7 years ago

Android Application Penetration Testing – Part 10

Attacking Broadcast receiver: A Broadcast Receiver is an Android Component which allows you to register for system or application events.We…

7 years ago