Quantcast
Channel: Security Compass Labs » Android
Browsing all 8 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Common Mobile Application Security Pitfalls

It is a well-documented fact that information transfer over the internet is transitioning over to mobile devices at an alarming rate. Here are some links that provide a high level statistical view of...

View Article



Image may be NSFW.
Clik here to view.

Bypassing Android’s Password Screen

This video demonstrates how to bypass the password screen on an android. If you lose your phone, someone who finds it can use this attack to get around the password you set. This attack requires a...

View Article

Image may be NSFW.
Clik here to view.

Weaponizing the Android Emulator (plus a new tool)

Today, we’re going to look at a scenario where the Android Emulator can be repurposed as an exploitation tool. Specifically, we will look at attacks that involve cloning an application and user data...

View Article

Image may be NSFW.
Clik here to view.

Mobile Security Presentations from ToorCon and MISTI

Max Veytsman and Subu Ramanathan have just returned from presenting mobile security talks at ToorCon in San Diego and the MISTI Mobile and Smart Device Conference in Atlanta. The talks were entitled...

View Article

Image may be NSFW.
Clik here to view.

Wireless Gateway & Transparent Proxy for Mobile Security Assessments

Introduction In a typical run-time web application security assessment, we often use an HTTP proxy to intercept and manipulate client-server traffic. For web applications, configuring browser settings...

View Article


Image may be NSFW.
Clik here to view.

Exploiting and Defending Mobile Training @CanSecWest

Salut à tous, We are pleased to announce that we will be presenting our “Exploiting and Defending Mobile” training course @CanSecWest. Our “Exploiting and Defending Mobile” training will provide you...

View Article

Image may be NSFW.
Clik here to view.

Your Guide to Getting Started with Mobile Application Assessments

Many organizations already have some form of mobile presence or plans to deploy one in the near future but don’t know how to get started with mobile application assessments.  This guide will help you...

View Article

Image may be NSFW.
Clik here to view.

Exploiting and Defending Mobile Training – CanSecWest

Salut à tous, We are pleased to announce that we will be presenting our “Exploiting and Defending Mobile” training course @CanSecWest. Our “Exploiting and Defending Mobile” training will provide you...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images