Mykhailo AntonishynMOBILE APPLICATIONS SECURITY TESTING METHODOLOGYEnsuring cybersecurity in the energy sector is a strategic goal №2 of the Energy Security Strategy of Ukraine [1]. The use of mobile…Jul 30Jul 30
Mykhailo AntonishynTransactional analysisToday, I want to share my experience of conducting transactional analysis. Let’s consider a situation where money was stolen from a crypto…May 19, 2023May 19, 2023
Mykhailo AntonishynConfiguring dynamic vulnerability testing tools for Android applicationsI read my old publications and realized that they are still relevant. So please don’t judge me harshly, these were my early attempts at…Mar 8, 2023Mar 8, 2023
Mykhailo AntonishynStatic analysis of mobile applications as the first step of security testingI read my old publications and realized that they are still relevant. So please don’t judge me harshly, these were my early attempts at…Mar 8, 2023Mar 8, 2023
Mykhailo AntonishynReverse Android app and Root-checking bypassI read my old publications and realized that they are still relevant. So please don’t judge me harshly, these were my early attempts at…Mar 8, 2023Mar 8, 2023
Mykhailo AntonishynMethodology for testing crypto exchanges and crypto walletsI read my old publications and realized that they are still relevant. So please don’t judge me harshly, these were my early attempts at…Mar 8, 2023Mar 8, 2023
Mykhailo AntonishynUsing the OWASP Mobile TOP 10 methodology for testing Android applications.I read my old publications and realized that they are still relevant. So please don’t judge me harshly, these were my early attempts at…Mar 7, 2023Mar 7, 2023
Mykhailo AntonishynMobile vulnerabilities in 2022 and potential security threats in 2023Nowadays people prefer to use their smartphone for watching video, playing games, ordering food, chatting with friends, еtс. We use mobile…Mar 2, 2023Mar 2, 2023
Mykhailo AntonishynCyber Hygiene RulesWhy can cyber hygiene rules save you from cyber attacks?Nov 23, 2022Nov 23, 2022