Eagle CrossMobile Security: Protecting Your Device from Cyber ThreatsMobile devices are part and parcel of our lives. These devices we use to communicate with one another, access sensitive information, and…Nov 288
Manish Adithya (5h3nron)EXPLORING VULNERABILITES IN DIVA APK — A COMPREHENSIVE APPROACHIn this article, I delve into my first exploration of the DIVA (Damn Insecure and Vulnerable App) APK, highlighting various security flaws…Jul 29
InProAndroidDevbyRadheshyam SinghSecuring Mobile Applications: Ensuring Safety from Development to End UserA Comprehensive Guide to Ensuring Robust Security Throughout the Mobile App LifecycleAug 26Aug 26
Sargam DhaliwalGuide to Basic Tool Setup for Android Penetration Testing | Part 3Disclaimer: My work on medium.com is for education purpose only, not for any illegal activities.Jul 23, 2021Jul 23, 2021
Raouf DaveEvolution of Cyber Security in mobile apps (Part 2)In the previous part, we discussed about the history and evolution of mobile security on Android, and in this part, we’ll delve deeper into…Aug 17Aug 17
Eagle CrossMobile Security: Protecting Your Device from Cyber ThreatsMobile devices are part and parcel of our lives. These devices we use to communicate with one another, access sensitive information, and…Nov 288
Manish Adithya (5h3nron)EXPLORING VULNERABILITES IN DIVA APK — A COMPREHENSIVE APPROACHIn this article, I delve into my first exploration of the DIVA (Damn Insecure and Vulnerable App) APK, highlighting various security flaws…Jul 29
InProAndroidDevbyRadheshyam SinghSecuring Mobile Applications: Ensuring Safety from Development to End UserA Comprehensive Guide to Ensuring Robust Security Throughout the Mobile App LifecycleAug 26
Sargam DhaliwalGuide to Basic Tool Setup for Android Penetration Testing | Part 3Disclaimer: My work on medium.com is for education purpose only, not for any illegal activities.Jul 23, 2021
Raouf DaveEvolution of Cyber Security in mobile apps (Part 2)In the previous part, we discussed about the history and evolution of mobile security on Android, and in this part, we’ll delve deeper into…Aug 17
Sargam DhaliwalGuide to Basic Tool Setup for Android Penetration Testing | Part 2Disclaimer: My work on medium.com is for education purpose only, not for any illegal activities.Jul 22, 2021
RASHID MUSTAFAUse the built-in privacy and security protections of iPhoneiPhone is designed to protect your data and your privacy. Built-in privacy features minimize how much of your information is available to…Jul 121
InConfessions of A Grumpy CISObyAlexander JasonGuardians Beyond the Gates: The Quest for Mobile SecurityWelcome, my grumpy compatriots, to yet another chapter in our shared chronicle. Today, I have the distinct pleasure of presenting Chapter…Apr 24