Tag: Android security

Antivirus

Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission

To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can't be trusted. Security experts form Check Point...
Penetration testing Android Application checklist

Penetration Testing Android Application Checklist

Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system...

Android Application Penetration Testing Part 6

Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10. https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 M1 - Improper Platform Usage            ...
Android Application Penetration Testing

Android Application Penetration Testing – Part 5

Android Components Three of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent. Activating Components Intents bind individual components to...
Android Phones Vulnerable to Cloak & Dagger attack

Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack

Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control over your device. These attack...

Most Popular

Recommended