Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Mobile

  1. Home
  2. Mobile

Category: Mobile

Android Forensics Hacks Mobile

IMEI No. Validation Bypass for Android Application

Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application developers use this device id […]

March 22, 2016January 16, 2025
6
Android Forensics DFIR Hacks Mobile

Android Forensics: How To Bypass The Android Phone Pattern Lock

Introduction Android is an open source operating system based on the Linux kernel, initially developed by Android Inc., which Google bought in 2005. Initially, Android […]

April 7, 2014January 10, 2025
30
Case Studies Malware Analysis Mobile Research Secure Coding

Gone in 60s Malware Analysis Report

It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.

October 5, 2013
3
Fundamentals Mobile Reading

Mobile Device Management (MDM) – Challenges and Solutions

What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. […]

July 26, 2013January 22, 2025
0
Hacks Malware Analysis Mobile Research Social Engineering

SMiShing – On My (An)droid

Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number to call or a website […]

December 12, 2012January 17, 2025
0
Case Studies Compromise Detection Malware Analysis Mobile Research Tools

Russian FruitNinja Backdoor Analysis

For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, it made a compelling case […]

October 9, 2012
2
Case Studies DFIR Mobile Secure Coding

Risk Analysis of Android Based Appliance

Overview I had to do the risk analysis of the Android 2.2 – Froyo based appliance and check for any security flaws exist in it […]

November 24, 2011January 21, 2025
1

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top