Common Mobile Application Security Pitfalls
It is a well-documented fact that information transfer over the internet is transitioning over to mobile devices at an alarming rate. Here are some links that provide a high level statistical view of...
View ArticleBypassing Android’s Password Screen
This video demonstrates how to bypass the password screen on an android. If you lose your phone, someone who finds it can use this attack to get around the password you set. This attack requires a...
View ArticleWeaponizing the Android Emulator (plus a new tool)
Today, we’re going to look at a scenario where the Android Emulator can be repurposed as an exploitation tool. Specifically, we will look at attacks that involve cloning an application and user data...
View ArticleMobile Security Presentations from ToorCon and MISTI
Max Veytsman and Subu Ramanathan have just returned from presenting mobile security talks at ToorCon in San Diego and the MISTI Mobile and Smart Device Conference in Atlanta. The talks were entitled...
View ArticleWireless Gateway & Transparent Proxy for Mobile Security Assessments
Introduction In a typical run-time web application security assessment, we often use an HTTP proxy to intercept and manipulate client-server traffic. For web applications, configuring browser settings...
View ArticleExploiting and Defending Mobile Training @CanSecWest
Salut à tous, We are pleased to announce that we will be presenting our “Exploiting and Defending Mobile” training course @CanSecWest. Our “Exploiting and Defending Mobile” training will provide you...
View ArticleYour Guide to Getting Started with Mobile Application Assessments
Many organizations already have some form of mobile presence or plans to deploy one in the near future but don’t know how to get started with mobile application assessments. This guide will help you...
View ArticleExploiting and Defending Mobile Training – CanSecWest
Salut à tous, We are pleased to announce that we will be presenting our “Exploiting and Defending Mobile” training course @CanSecWest. Our “Exploiting and Defending Mobile” training will provide you...
View Article
More Pages to Explore .....