IMEI No. Validation Bypass for Android Application
Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application developers use this device id […]
Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application developers use this device id […]
Introduction Android is an open source operating system based on the Linux kernel, initially developed by Android Inc., which Google bought in 2005. Initially, Android […]
It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.
What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. […]
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number to call or a website […]
For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, it made a compelling case […]
Overview I had to do the risk analysis of the Android 2.2 – Froyo based appliance and check for any security flaws exist in it […]