Mi3 Security prides itself on having two key differentiators; the DEPTH of risk intelligence we produce for applications and the SPEED at which we produce those intelligence results.
DEPTH of Risk intelligence
Mi3 Security has spent nearly half a decade creating the RECON Platform to aggregate and integrate threat intelligence feeds across every possible threat source. The platform analyzes everything from malicious Android and iOS frameworks to OWASP Top 10 threats to rogue brand infringement on torrent engines.
Speed of results
We heard our customers, and we listened. Mi3 Security has fine tuned the RECON Platform to analyze threats and uncover actionable risk conditions in record time; eleven minutes for iOS applications and six minutes for Android applications, ensuring rapid response for the most demanding app test environments.
Nobody (except a bad actor) wants their mobile app to wreak havoc on unsuspecting users, or expose them to glaring flaws in security. By looking inside the app to analyze the software, you can see how it behaves, but what about the domains and networks it links to, or apps that share some of the same code? How safe are they?
Don’t get us wrong – manual testing of software is still an important and valuable part of quality assurance, leveraging human intuition and inventiveness for proper coverage. But there’s a penalty to pay as well. Manual testing takes time and effort. When good automation can handle a large part of what would otherwise have been manual testing, in minutes instead of days, and at a fraction of the cost, insisting on manual testing could be a significant error.
Many apps ask for information and permissions at the time of installation to track user activity, and users often consent to these requests. However, when such an app is deleted by the user, such tracking should stop as well. Instead, using a technique known as fingerprinting, app creators can illicitly track mobile devices even after the app has been deleted, or before it is reinstalled.