The last 5 years has seen the growth of smartphone malware. Explore the timeline of rootkits and bootkits on mobiles devices.
In a world where your smartphone is becoming the core authentication device for every Internet service, we need to understand how app development practices are impacting security and privacy.
Mobile World Congress Americas (MWCA) 2017 just took place, with a plethora of current mobile products and solutions, and some tantalizing glimpses of future. The projections are for growth, growth, and more growth, either by equipping the mobile-less minority with mobile devices, or getting existing users to do even more with their mobiles, from controlling their toasters to managing networks of connected sensors.
As an attendee you would expect that a premier event such as MWC would take the appropriate measures to protect both itself and you, but they haven't. After leveraging our platform to rapidly analyze the MWC application we found multiple vulnerabilities that could put attendees at significant risk. What's worse is that one of the vulnerabilities has been around since 2012 and has been documented in at least nine different books (yes, nine) on mobile security and hacking mobile devices.