CALL US

+91 9116117170

Category: Android

Application of OWASP Mobile TOP 10 Methodology for Testing Android Applications

By Chandan Singh 0 Comment August 17, 2018

According to survey about OWASP Mobile TOP 10 Vulnerabilities, of the top 30 applications with more than 500,000 installations, 94% contain at least three medium-risk vulnerabilities, and 77% contain at least two high-risk vulnerabilities. Out of 30 applications, 17% were vulnerable to MITM (Men-In-The-Middle) attacks, exposing all data to interception by intruders. In addition, 44% of […]

Cybersecurity: The five main lessons for all

By Chandan Singh 0 Comment May 21, 2018

Recently we had an opportunity – quite fun and interesting – to attend a series of conferences devoted to information security and cyber security. These conferences were filled with relatively “new” developments, such as NextGen, Internet of things (IoT), DdoS attacks on IoT devices, security intelligence platform, etc. The fact that some of these terms caused “hype” […]

Dark Web: Everything You Need to Know about the Invisible Web

By Chandan Singh 0 Comment April 4, 2018

Dark Web: Everything You Need to Know about the Invisible web Dark Web – this term refers to a set of websites that are visible in public while having a hidden IP address of the server on which they are located. These sites can be visited by all web users, but it is very difficult […]

Vulnerability in Tinder allows You to View Photos and User actions

By Chandan Singh 0 Comment January 29, 2018

In 2018, most applications use encryption to transfer data to the cloud, so that a stranger sitting with you in the same cafe cannot find out what secrets you are passing to someone on Wi-Fi. Most, but not Tinder – the most popular application for online dating. And this means that a skilled hacker can easily see all your […]

Famous computer company moves to Android?

By Chandan Singh 0 Comment September 23, 2017

According to a new report, one of the leading computer companies in the world considering the transition of its intended primarily for businesses on Android devices. However, this will not mean a complete rejection of the Windows-technologies. It is possible that the search for the best possible way to combine the advantages of both platforms. Elite […]

error: Content is protected by Cyberops !!