IMEI No. Validation Bypass for Android Application
Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application […]
Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application […]
Introduction Android is an open source operating system based on the Linux kernel, initially developed by Android Inc., which Google […]
It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.
What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile […]
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number […]
For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, […]
Overview I had to do the risk analysis of the Android 2.2 – Froyo based appliance and check for any […]