Chris Holcombenullvoid.hashnode.dev·Dec 8, 2024Bits, Bytes, and Breaking News: FSB Deploys Trojanized Spyware Against Russian ProgrammerWhen surveillance meets suppression, the result is a chilling reality for those caught in the crosshairs. The Russian Federal Security Service (FSB) has once again flexed its digital muscle, deploying spyware against a programmer accused of donating ...CyberWatch WeeklySpywareThreats
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 13, 2024Day 14: Mobile Device Security“Remember when phones were just for calling? Now they hold your bank info, photos, and even that one embarrassing note you wrote at 2 a.m. Protect it like your life is on it!” Welcome to Day 14 of #CybersecurityAwarenessMonth! We're concentrating ...Cybersecurity Awareness 2024: Securing Our WorldSafeMobileUsage
Nabeelask1dd1e.hashnode.dev·Aug 4, 2024How to Perform Mobile Static Analysis with ScroungerHowdy y’all,In this article, we will explore how to perform static security analysis of mobile applications using a Metasploit-like framework called Scrounger. Static Security Testing involves examining an application’s components without executing t...157 readsmobile security
Pratik Mhatrepnmhatre.hashnode.dev·Jun 7, 2024Unlocking the Secrets to Android App Security: An IntroductionIn today's world, mobile applications play a crucial role in our daily lives, making the security of these applications more important than ever. As developers, it's our responsibility to protect our users' data and privacy. This blog series aims to ...Android
Dave Poirierblog.encoded.life·Jan 6, 2024Your Swift app is full of symbols, even if stripped.We have been drilled that we should strip debugging symbols before releasing our app on the App Store. Apple even does this automatically for us in the build settings when we create a new project. However when we are using Swift as our programming la...1 like·377 readsMobile SecurityiOS
Dave Poirierblog.encoded.life·Nov 14, 2023Secure JSON handling in SwiftWhen storing or reading data from a disk, or when making API calls, does your app's sole validation of data involve ensuring that the JSON can be decoded? How do you receive email addresses in your JSON? Do you use a simple string variable? There is ...1 like·470 readsiOS
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 12, 2023Defending Your Mobile DevicesIn a world driven by technology, our devices have become indispensable companions. They connect us, store our personal data, and empower us daily. But, with great convenience comes great responsibility — defending our mobile devices is paramount! Thi...ncsam
Temidayo Jacobtemidayoxyz.hashnode.dev·Apr 21, 2023Why You Shouldn't Ignore Your Samsung Software UpdatesMany people rely on their Samsung devices to stay connected to the world. However, it's not just about staying connected; it's about ensuring your connection is secure by regularly keeping your device software up to date. While updates can improve yo...37 readsMobile technology