Post Profile






How to: Testing Android Application Security, Part 4

One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth in a series of posts on pen testing Android applications. In the first we set up the testing environment and captured traffic. In […] The post How to: Testing Android Application Security, Part 4 appeared first on McAfee.
read more

share

Related Posts


WhatsApp is secure and OK for politicians to use, provided simple steps are followed

Technology : Physorg: Technology news

Australian politicians have been accused of risking national security by using the messaging app WhatsApp. At issue was the fact that the application had not been cleared by the Australian Signals Directorate (ASD) and was not on th...

Testing Race Conditions in Web Applications

Technology / Security : McAfee Avert Labs

When determining black-box or gray-box application security (penetration testing), an assessor mostly concentrates on the top 10 Open Web Application Security Project vulnerabilities and rarely worries about testing race-condition i...

How to: Testing Android Application Security, Part 2

Technology / Security : McAfee Avert Labs

The popularity of Android devices and applications makes it a target for malware and other threats. This post is the second in a short series on Android application security. In the first article we discussed the basic android envir...

How to: Testing Android Application Security, Part 1

Technology / Security : McAfee Avert Labs

The popularity of Android devices and applications makes it a target for malware and other threats. This post is the first in a short series on Android application security. Similar to its use for web applications, penetration (“pen...

How to: Testing Android Application Security, Part 3

Technology / Security : McAfee Avert Labs

One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the third in a series of posts on pen testi...

Comments


Copyright © 2016 Regator, LLC