Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

Hunting for Android Privilege Escalation with a 32 Line Fuzzer

Trustwave SpiderLabs tested a couple of Android OS-based mobile devices to conduct the research on privilege escalation scenarios. Specifically, we wanted to show a straightforward process attackers may use to exploit vulnerabilities in an Android device’s system services and systems. The testing revealed that, in some cases, exploiting the issues we found were very easy.

Critical OWASP Mobile Top 10 2023 Vulnerabilities [+Mobile App Pen-testing Checklists]

Get Android & iOS App Penetration Testing Checklists with OWASP Top 10 Securing mobile applications poses distinct challenges compared to websites. Mobile apps require specialized attention with risks ranging from secure data transfer to device-specific vulnerabilities. Businesses need the right resources and guidance to protect their mobile applications. The OWASP Mobile Top 10 is a good starting point as it outlines the risks and provides actionable tips for mitigating risks.

Appknox Stands Out in Gartner's 2023 'Voice of the Customer' for Application Security Testing

Appknox continues to solidify its position as a top-tier vendor in application security testing, receiving prestigious recognition from Gartner as one of the leading vendors for Voice of the Customer. This recognition underscores Appknox's unwavering commitment to customer satisfaction, its consistent delivery of robust, developer-centric security solutions, and also its continued relevance in the ever-evolving landscape of application security.

Understanding Mobile Payment Security

As the holiday shopping season kicks in, many are eager to secure early bird discounts and offers, preparing for the festive season. The convenience and speed of mobile devices has led to a growing number of individuals opting for mobile payments, whether conducted online or through contactless systems. The global mobile payment revenue is expected to reach $12.06 trillion by 2027, and smartphone users are anticipated to surpass 7.7 billion by 2028.

EBOM vs. MBOM vs. SBOM: Key Differences & Best Practices

Managing all aspects of the product development cycle is a crucial element of a profitable company. Most businesses understand that an efficient product lifecycle depends on the proper positioning and management of the Bills of Materials (BOM), be it for product designing and manufacturing or software development. Getting all the BOMs right is the essential first step toward achieving operational efficiency.

Wearable Apps for Health and Fitness: Investigating Their Future Potential

Recently, popular wearable applications have changed how we track our health and fitness objectives. These applications, intended for smartwatches and fitness trackers, provide several features to help people live healthier and more active lifestyles. This article will address wearable apps' advantages, market growth, prospective uses, difficulties, and solutions in the health and fitness business.

Penetration Testing Software vs. Human Expertise: Finding the Right Balance

Penetration testing remains a crucial element in cybersecurity, providing organizations with the proactive means to identify and address security vulnerabilities long before they become opportunities for malicious actors. More than 75% of businesses perform pen-testing either to maintain their security posture or due to compliance reasons.

Mobile Security in the Age of Smartphones: Tips for Users and Developers

Smartphones have become ubiquitous with today’s digital world, serving as a central hub for personal and professional activities. This widespread use has escalated the importance of mobile security, making it a critical concern for both users and developers. As cyber threats evolve, so does the need for robust mobile security measures.